Lucene search

K
cve[email protected]CVE-2022-2915
HistoryAug 26, 2022 - 9:15 p.m.

CVE-2022-2915

2022-08-2621:15:08
CWE-787
CWE-122
web.nvd.nist.gov
35
10
cve-2022-2915
sonicwall
sma100
heap-based buffer overflow
remote authentication
dos
code execution

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.1%

A Heap-based Buffer Overflow vulnerability in the SonicWall SMA100 appliance allows a remote authenticated attacker to cause Denial of Service (DoS) on the appliance or potentially lead to code execution. This vulnerability impacts 10.2.1.5-34sv and earlier versions.

Affected configurations

NVD
Node
sonicwallsma_200_firmwareRange≀10.2.1.5-34sv
AND
sonicwallsma_200Match-
Node
sonicwallsma_210_firmwareRange≀10.2.1.5-34sv
AND
sonicwallsma_210Match-
Node
sonicwallsma_400_firmwareRange≀10.2.1.5-34sv
AND
sonicwallsma_400Match-
Node
sonicwallsma_410_firmwareRange≀10.2.1.5-34sv
AND
sonicwallsma_410Match-
Node
sonicwallsma_500v_firmwareRange≀10.2.1.5-34sv
AND
sonicwallsma_500vMatch-

CNA Affected

[
  {
    "product": "SMA100",
    "vendor": "SonicWall",
    "versions": [
      {
        "status": "affected",
        "version": "10.2.1.5-34sv and earlier"
      }
    ]
  }
]

Social References

More

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.1%

Related for CVE-2022-2915