Search criteria

12 vulnerabilities found for tz600p_firmware by sonicwall

FKIE_CVE-2022-47522

Vulnerability from fkie_nvd - Published: 2023-04-15 02:15 - Updated: 2025-02-06 16:15
Summary
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz670_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B1EB82E-91D7-4197-B762-56A5578FA269",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "676DF3BF-7777-4FA9-8512-457FBA956F21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9369143D-4BA5-4A36-9CB5-9DF28F5FD071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4118D-750F-4CB0-A47D-420B85331515",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz470_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46ED34C5-0DDC-4378-AC24-CC288FA6CC32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz470w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D2ED33A-7AE7-4EA1-B4D4-524B5B3538D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz370_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0E504C1-4E34-4CA3-B5A8-44A02D53E1E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz370w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DC5202E-61D9-405D-91BD-E6037DBCB71D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz270_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A1023D6-D82F-4E09-97B8-F7A57D6F7686",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz270w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "885DFDA5-2DB8-471A-B694-CAD5BEA96944",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F6D757-D0EF-4450-985F-49B78F436667",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506950B-2404-41D2-8EF3-1694777D9EEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz600p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1114D0A0-516C-4A6D-B578-0D401C692542",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B4C9916-AD16-4E31-90A6-2AD577EA9783",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96F78C44-08CB-4AEF-AFEF-1ABCF62EF9F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09B5BCD-C830-4C67-B966-1CA499F21D04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz500w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FDDC97A-3D6E-4B9E-B7C7-1281EFD09B5F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA61303F-736E-411F-AEF3-6335C0795138",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEAA71F-6BD8-4FE4-844D-080AF7B61DDE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50B19A6-80C4-4FF7-9CD5-58938641D3DC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz400w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70DDAC21-91E2-4C49-9AD4-0B35D930042B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "745643D6-9336-4FBE-9625-99599DFBB8A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz350_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5E19E36-07EB-4FE7-B4CD-8C1E8C116A27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "479B1418-CA62-4B24-A5DB-21F488941754",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz350w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AC214A-ADA4-4607-B1CD-D0D8FA450F88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E0AB47-5EE3-4F2F-B442-DA48C58C44D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B16351E-5793-40FA-8B3E-CABF8F709E1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09678BBE-7603-41D2-BF09-415CA33C7EFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz300p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63F6B06B-8220-438D-BF43-97A33C07EE13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7003DBEF-CA74-4429-B567-5CFFB83762E6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz300w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBBB888A-F19B-4F7C-A2FD-01AA65F6FAD6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8AC8EAE-99BE-4889-9978-5083F71D7178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:soho_250_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B9134E3-57D4-40C4-B268-B952F249AF7E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:soho_250w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0687F825-6F19-4227-B5F3-5E9DD0D4621B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicwave_231c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64ABCFAF-DB16-4EF1-98EC-DB7E5E757DC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:sonicwave_231c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57028B23-5593-4442-A746-2A248DEFB4EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicwave_224w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B840890-AC02-457D-9E67-FEC07EFEAE25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:sonicwave_224w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B549B-AA18-4018-8E9B-A46D032A7AD3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicwave_432o_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "390D6FCD-3D04-4DFD-B8B6-DF2CD6E44087",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:sonicwave_432o:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45DE092E-A5B8-41B4-AF99-897E1F18DF1C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicwave_621_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B3BB5E-325A-4B70-9209-253B18EF56EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:sonicwave_621:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD8FCD1-9A77-4120-A2EB-E2D8C7E7E006",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicwave_641_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0869CE-BF47-4243-96FD-CD51AC751CA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:sonicwave_641:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5CBFB2F-1BC7-411C-824F-6240CF289905",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicwave_681_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4134FE2-6A7D-41C9-A214-2CE0A59FC23D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:sonicwave_681:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDECE3D2-594C-4FC7-BC65-7813F7446B14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target\u0027s MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target\u0027s original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client\u0027s pairwise encryption key."
    }
  ],
  "id": "CVE-2022-47522",
  "lastModified": "2025-02-06T16:15:31.443",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-04-15T02:15:07.290",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://papers.mathyvanhoef.com/usenix2023-wifi.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable"
      ],
      "url": "https://www.wi-fi.org/discover-wi-fi/passpoint"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://papers.mathyvanhoef.com/usenix2023-wifi.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "https://www.wi-fi.org/discover-wi-fi/passpoint"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-290"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-290"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2022-22277

Vulnerability from fkie_nvd - Published: 2022-04-27 17:15 - Updated: 2024-11-21 06:46
Summary
A vulnerability in SonicOS SNMP service resulting exposure of Wireless Access Point sensitive information in cleartext.
Impacted products
Vendor Product Version
sonicwall tz300p_firmware *
sonicwall tz300p_firmware 7.0.0
sonicwall tz300p -
sonicwall tz300w_firmware *
sonicwall tz300w_firmware 7.0.0
sonicwall tz300w -
sonicwall tz350_firmware *
sonicwall tz350_firmware 7.0.0
sonicwall tz350 -
sonicwall tz350w_firmware *
sonicwall tz350w_firmware 7.0.0
sonicwall tz350w -
sonicwall nssp_10700_firmware *
sonicwall nssp_10700 -
sonicwall nssp_11700_firmware *
sonicwall nssp_11700 -
sonicwall nssp_12400_firmware *
sonicwall nssp_12400 -
sonicwall nssp_12800_firmware *
sonicwall nssp_12800 -
sonicwall nssp_13700_firmware *
sonicwall nssp_13700 -
sonicwall nssp_15700_firmware *
sonicwall nssp_15700 -
sonicwall tz370_firmware *
sonicwall tz370_firmware 7.0.0
sonicwall tz370 -
sonicwall tz370w_firmware *
sonicwall tz370w_firmware 7.0.0
sonicwall tz370w -
sonicwall tz400_firmware *
sonicwall tz400_firmware 7.0.0
sonicwall tz400 -
sonicwall nsv_10_firmware *
sonicwall nsv_10 -
sonicwall nsv_100_firmware *
sonicwall nsv_100 -
sonicwall nsv_1600_firmware *
sonicwall nsv_1600 -
sonicwall nsv_200_firmware *
sonicwall nsv_200 -
sonicwall nsv_25_firmware *
sonicwall nsv_25 -
sonicwall nsv_270_firmware *
sonicwall nsv_270 -
sonicwall nsv_300_firmware *
sonicwall nsv_300 -
sonicwall nsv_400_firmware *
sonicwall nsv_400 -
sonicwall nsv_470_firmware *
sonicwall nsv_470 -
sonicwall nsv_50_firmware *
sonicwall nsv_50 -
sonicwall nsv_800_firmware *
sonicwall nsv_800 -
sonicwall nsv_870_firmware *
sonicwall nsv_870 -
sonicwall tz400w_firmware *
sonicwall tz400w_firmware 7.0.0
sonicwall tz400w -
sonicwall tz470_firmware *
sonicwall tz470_firmware 7.0.0
sonicwall tz470 -
sonicwall tz470w_firmware *
sonicwall tz470w_firmware 7.0.0
sonicwall tz470w -
sonicwall tz500_firmware *
sonicwall tz500_firmware 7.0.0
sonicwall tz500 -
sonicwall nsa_2650_firmware *
sonicwall nsa_2650_firmware 7.0.0
sonicwall nsa_2650 -
sonicwall nsa_2700_firmware *
sonicwall nsa_2700_firmware 7.0.0
sonicwall nsa_2700 -
sonicwall nsa_3650_firmware *
sonicwall nsa_3650_firmware 7.0.0
sonicwall nsa_3650 -
sonicwall nsa_3700_firmware *
sonicwall nsa_3700_firmware 7.0.0
sonicwall nsa_3700 -
sonicwall nsa_4650_firmware *
sonicwall nsa_4650_firmware 7.0.0
sonicwall nsa_4650 -
sonicwall nsa_4700_firmware *
sonicwall nsa_4700_firmware 7.0.0
sonicwall nsa_4700 -
sonicwall nsa_5650_firmware *
sonicwall nsa_5650_firmware 7.0.0
sonicwall nsa_5650 -
sonicwall nsa_5700_firmware *
sonicwall nsa_5700_firmware 7.0.0
sonicwall nsa_5700 -
sonicwall nsa_6650_firmware *
sonicwall nsa_6650_firmware 7.0.0
sonicwall nsa_6650 -
sonicwall nsa_6700_firmware *
sonicwall nsa_6700_firmware 7.0.0
sonicwall nsa_6700 -
sonicwall nsa_9250_firmware *
sonicwall nsa_9250_firmware 7.0.0
sonicwall nsa_9250 -
sonicwall nsa_9450_firmware *
sonicwall nsa_9450_firmware 7.0.0
sonicwall nsa_9450 -
sonicwall nsa_9650_firmware *
sonicwall nsa_9650_firmware 7.0.0
sonicwall nsa_9650 -
sonicwall tz500w_firmware *
sonicwall tz500w_firmware 7.0.0
sonicwall tz500w -
sonicwall tz570_firmware *
sonicwall tz570_firmware 7.0.0
sonicwall tz570 -
sonicwall tz570p_firmware *
sonicwall tz570p_firmware 7.0.0
sonicwall tz570p -
sonicwall tz570w_firmware *
sonicwall tz570w_firmware 7.0.0
sonicwall tz570w -
sonicwall tz600_firmware *
sonicwall tz600_firmware 7.0.0
sonicwall tz600 -
sonicwall tz600p_firmware *
sonicwall tz600p_firmware 7.0.0
sonicwall tz600p -
sonicwall tz670_firmware *
sonicwall tz670_firmware 7.0.0
sonicwall tz670 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz300p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC23B54-639C-4FFF-B580-6E787ECAC3BC",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz300p_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "122ABFDB-2BE3-475F-920A-7FAAA3850EB4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7003DBEF-CA74-4429-B567-5CFFB83762E6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz300w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFBFE42-2E8D-4549-B095-B47E0DC00CAC",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz300w_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF0FFA3F-E5A0-4B84-86A9-F4A82438461B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8AC8EAE-99BE-4889-9978-5083F71D7178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz350_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52309DBB-F7A4-4B32-936E-8EBEEFBA2592",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz350_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BDA1B77-C458-4782-8D05-EE0942AE423F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "479B1418-CA62-4B24-A5DB-21F488941754",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz350w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "955D5EEA-51F0-456B-94E1-5FE29B110699",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz350w_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D637E6A-83EA-4CEC-810D-164A2E95565E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E0AB47-5EE3-4F2F-B442-DA48C58C44D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_10700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C0B074-3D97-49BB-A3FD-D316FBFE0F95",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_11700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59528209-07F4-461E-B120-5559D4E9DA90",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_12400_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB28494B-45BC-4DA4-913C-6569A898AE01",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2F22AB1-044C-45F1-BD33-82BB46402363",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_12800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B77B8C4-AD73-4C26-91AE-BA66DEA21D11",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E62EAD79-2CD4-4479-B26A-A0C97B5B241A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_13700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FC1D781-9F63-4559-AB61-F22F09DCB915",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_15700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA21425-8435-4BFB-A75C-E53B50AB54B7",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6CF3CF-256C-4C04-8BDF-B16398CD0459",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz370_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "925AED91-15F8-4ED0-8FF1-A6A7AB5EC3E9",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz370_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8134DD19-2F0D-4925-9707-BD69792EEB51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz370w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2D2D9D-459C-4009-AB88-68196493092A",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz370w_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "52AB25CE-F6BB-45C0-8C9F-DBE18C0DB710",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz400_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C01F71-D6ED-4C9F-AE0A-40712F29512B",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz400_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3DF817-A706-4DC9-BCB9-637AA6CB71F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50B19A6-80C4-4FF7-9CD5-58938641D3DC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE24F88-E6D3-410F-814E-9C3E7F7B2AAD",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75912A50-E148-43C9-9335-BE19977F8A70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEAFEE2-A23A-47EF-B6C1-E0B554F173CD",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12CF8746-84DF-4FB6-B5B7-AAED39E7FA6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_1600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D85DE14-68AA-43EC-BECF-6E8CBC40AFAC",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_1600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ED84FC8-3E4E-4D29-B725-57AE7EEEC6DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F5C662-A97A-4B1C-AEE9-08724F55B818",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0B21B1-ABA5-49E2-9B43-E85B9B447F45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_25_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A382C1-EA35-44EC-B2EA-4740AA0F7BE5",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_25:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "731B4849-2F0B-4625-B768-2287964ECDAF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_270_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DE753AE-26B3-4549-992A-AC80D578474C",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD008C6-6F0F-40FF-879B-8362DA326686",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC92834-A624-49D8-BF14-9F545C63EB0B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_400_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60BA1C39-04C3-4652-B060-FFD96B3B1C93",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18066544-CD00-41A5-9392-6023020853D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_470_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2D35CB-BFDF-4661-880D-E3EC2576B6F9",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_50_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71DE0BAA-A331-4EA1-A66F-D641D6BF41E9",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A644965-B1B8-4581-BCAC-8D6BCC961A03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C01396B-2F62-42F1-9FE8-A6E762C39269",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30061761-D324-43DD-B43D-F2DFEF987364",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_870_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4633CAF-FD12-4AEF-A994-EED301A41AD0",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz400w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "009872A9-8585-4B07-A399-A6626D8A1FEB",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz400w_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ECC6BC-395B-4D1E-83BA-550CFDDD833E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "745643D6-9336-4FBE-9625-99599DFBB8A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz470_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA11D013-9E25-4D7C-A662-CE78923B025E",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz470_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D55EB54-E43D-4EF5-952C-924F48CE1CFD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz470w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEC0A24-3D87-42CF-B5EC-DBC9D0B3409C",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz470w_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C00AC04A-D185-4759-9766-A13F28EB3D35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AABB0E80-9BDD-4E40-9719-A6BA2FECBE16",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz500_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30DF832-0EEA-4DEF-A81A-5ECB418AF3A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09B5BCD-C830-4C67-B966-1CA499F21D04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_2650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E1A5847-DD41-4A31-9E8F-DCDCF8570ACD",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_2650_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "757C46AF-CB8F-479B-B9C0-B47AD9F375F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_2700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E6923CA-01F3-4F9F-821F-E9D720684458",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_2700_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "74C381B8-5E14-469B-BE47-6D8B79C3DDE7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_3650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9D2A23-86F1-44F0-80DE-0984B7D3FA7F",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_3650_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DA3A5B6-FA71-4EC1-AC05-42D17A3B88BD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_3700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3315228E-6350-4CCB-9794-92DD4BF20917",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_3700_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "714723A9-BBCF-4192-9233-83EFB87F95D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_4650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "699E201F-1F8E-4D94-ADEF-9D828489AE86",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_4650_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC28E32-5638-4727-A06C-E49090CF20F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_4700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3059A0-8EB4-46B3-B0E4-29DA9C4C3353",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_4700_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA73FF90-2F80-463D-8F31-CA5BEF93FCC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_5650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F18AA1-A316-4BA0-9610-FB5FF0FDD4ED",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_5650_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "461E7DB6-21ED-4774-8AF7-819C42904CF2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_5700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8494BD6-7824-431F-BF54-207E29FDD9EA",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_5700_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "723A7EFA-0E9D-454A-A584-0FAD24F0A9C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_6650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C0321EB-3092-4D7F-953E-37A421CF80FB",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_6650_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEF6F6C-6E2D-405A-B0A2-4073C6B884EC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_6700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C33E77A7-02CA-42CE-8F96-11547D064C40",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_6700_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8045EACC-25C9-4D8E-BE55-E9032CB4E38C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9250_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD748C1F-0191-4B98-81D1-0A36411F4910",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9250_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D42C886-A250-47E7-AB9E-930F647DFB1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60219D0D-240E-4C5E-ADEE-0144DB076F28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9450_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B7E66A1-5522-408C-BFDB-D7CCFC1FF73A",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9450_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4AADBFB-6F6F-41FB-B638-D9F381956F1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "260EAE19-8320-4616-8833-B214D41FA98E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "531FDECB-33DC-40D2-A053-DE7A6072221B",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9650_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD15E0D8-718C-4C50-884A-80E733C72959",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F17A77-EB74-4815-A026-6116755EFB37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz500w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1039FA8-2794-4AD5-BBEB-0B757B07CEA3",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz500w_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FFBA4CE-98F9-4C4E-8231-B2599D9F1422",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA61303F-736E-411F-AEF3-6335C0795138",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD989400-6116-43DC-8CA4-2F293531F36C",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD779CD6-69BD-48DD-A05E-E939643E5F12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "876274D7-48FB-459F-83C5-02675A451E7E",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570p_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7DF5C88-66F9-4D52-AD29-26109A1ECEAF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "74CD0CA7-CF28-44A4-9396-ACFB113E9030",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570w_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2C820D-E0A3-4D46-B142-1FDE228D8EFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53DE309B-88EF-46FD-A8FF-22AEC0210ACB",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz600_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44CA26BE-FBB5-4946-A6FC-D5A3E0D9FDD7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506950B-2404-41D2-8EF3-1694777D9EEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz600p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E8CC11-5869-4F72-AA3F-F0A85BF76A0B",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz600p_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B420B234-A97A-46CF-9163-E45EBF677737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B4C9916-AD16-4E31-90A6-2AD577EA9783",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz670_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B96FB085-E44C-4D7C-A4E2-E01F25CB3DA4",
              "versionEndExcluding": "6.5.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:tz670_firmware:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA8F7C68-EECF-4A41-98FC-DAB1E4F4CFF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in SonicOS SNMP service resulting exposure of Wireless Access Point sensitive information in cleartext."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el servicio SNMP de SonicOS resultando en una exposici\u00f3n de informaci\u00f3n confidencial del punto de acceso inal\u00e1mbrico en texto sin cifrar"
    }
  ],
  "id": "CVE-2022-22277",
  "lastModified": "2024-11-21T06:46:32.693",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-27T17:15:07.397",
  "references": [
    {
      "source": "PSIRT@sonicwall.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
    }
  ],
  "sourceIdentifier": "PSIRT@sonicwall.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "PSIRT@sonicwall.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-22276

Vulnerability from fkie_nvd - Published: 2022-04-27 17:15 - Updated: 2024-11-21 06:46
Summary
A vulnerability in SonicOS SNMP service resulting exposure of sensitive information to an unauthorized user.
Impacted products
Vendor Product Version
sonicwall tz300p_firmware *
sonicwall tz300p -
sonicwall tz300w_firmware *
sonicwall tz300w -
sonicwall tz350_firmware *
sonicwall tz350 -
sonicwall tz350w_firmware *
sonicwall tz350w -
sonicwall nssp_10700_firmware *
sonicwall nssp_10700 -
sonicwall nssp_11700_firmware *
sonicwall nssp_11700 -
sonicwall nssp_12400_firmware *
sonicwall nssp_12400 -
sonicwall nssp_12800_firmware *
sonicwall nssp_12800 -
sonicwall nssp_13700_firmware *
sonicwall nssp_13700 -
sonicwall nssp_15700_firmware *
sonicwall nssp_15700 -
sonicwall tz370_firmware *
sonicwall tz370 -
sonicwall tz370w_firmware *
sonicwall tz370w -
sonicwall tz400_firmware *
sonicwall tz400 -
sonicwall nsv_10_firmware *
sonicwall nsv_10 -
sonicwall nsv_100_firmware *
sonicwall nsv_100 -
sonicwall nsv_1600_firmware *
sonicwall nsv_1600 -
sonicwall nsv_200_firmware *
sonicwall nsv_200 -
sonicwall nsv_25_firmware *
sonicwall nsv_25 -
sonicwall nsv_270_firmware *
sonicwall nsv_270 -
sonicwall nsv_300_firmware *
sonicwall nsv_300 -
sonicwall nsv_400_firmware *
sonicwall nsv_400 -
sonicwall nsv_470_firmware *
sonicwall nsv_470 -
sonicwall nsv_50_firmware *
sonicwall nsv_50 -
sonicwall nsv_800_firmware *
sonicwall nsv_800 -
sonicwall nsv_870_firmware *
sonicwall nsv_870 -
sonicwall tz400w_firmware *
sonicwall tz400w -
sonicwall tz470_firmware *
sonicwall tz470 -
sonicwall tz470w_firmware *
sonicwall tz470w -
sonicwall tz500_firmware *
sonicwall tz500 -
sonicwall nsa_2650_firmware *
sonicwall nsa_2650 -
sonicwall nsa_2700_firmware *
sonicwall nsa_2700 -
sonicwall nsa_3650_firmware *
sonicwall nsa_3650 -
sonicwall nsa_3700_firmware *
sonicwall nsa_3700 -
sonicwall nsa_4650_firmware *
sonicwall nsa_4650 -
sonicwall nsa_4700_firmware *
sonicwall nsa_4700 -
sonicwall nsa_5650_firmware *
sonicwall nsa_5650 -
sonicwall nsa_5700_firmware *
sonicwall nsa_5700 -
sonicwall nsa_6650_firmware *
sonicwall nsa_6650 -
sonicwall nsa_6700_firmware *
sonicwall nsa_6700 -
sonicwall nsa_9250_firmware *
sonicwall nsa_9250 -
sonicwall nsa_9450_firmware *
sonicwall nsa_9450 -
sonicwall nsa_9650_firmware *
sonicwall nsa_9650 -
sonicwall tz500w_firmware *
sonicwall tz500w -
sonicwall tz570_firmware *
sonicwall tz570 -
sonicwall tz570p_firmware *
sonicwall tz570p -
sonicwall tz570w_firmware *
sonicwall tz570w -
sonicwall tz600_firmware *
sonicwall tz600 -
sonicwall tz600p_firmware *
sonicwall tz600p -
sonicwall tz670_firmware *
sonicwall tz670 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz300p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AFD3B4-E623-4E5E-B6E3-C868A904D099",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7003DBEF-CA74-4429-B567-5CFFB83762E6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz300w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6146E0C8-C5BB-499D-A96D-F389005907A9",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8AC8EAE-99BE-4889-9978-5083F71D7178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz350_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C184C3-B45C-463E-9EEE-93C809C3E30C",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "479B1418-CA62-4B24-A5DB-21F488941754",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz350w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "20B993F6-86CC-4B12-A0FD-BED6D327AAF7",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E0AB47-5EE3-4F2F-B442-DA48C58C44D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_10700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C0B074-3D97-49BB-A3FD-D316FBFE0F95",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_11700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59528209-07F4-461E-B120-5559D4E9DA90",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_12400_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB28494B-45BC-4DA4-913C-6569A898AE01",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2F22AB1-044C-45F1-BD33-82BB46402363",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_12800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B77B8C4-AD73-4C26-91AE-BA66DEA21D11",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E62EAD79-2CD4-4479-B26A-A0C97B5B241A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_13700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FC1D781-9F63-4559-AB61-F22F09DCB915",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_15700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA21425-8435-4BFB-A75C-E53B50AB54B7",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6CF3CF-256C-4C04-8BDF-B16398CD0459",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz370_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE1FC1E2-9445-4563-9003-8110C5E811C3",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz370w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39DBBC2B-24CC-4CF6-A700-090BDC890E94",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz400_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A6FF32-EDAF-4D5E-A365-F1C693498FD8",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50B19A6-80C4-4FF7-9CD5-58938641D3DC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE24F88-E6D3-410F-814E-9C3E7F7B2AAD",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75912A50-E148-43C9-9335-BE19977F8A70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEAFEE2-A23A-47EF-B6C1-E0B554F173CD",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12CF8746-84DF-4FB6-B5B7-AAED39E7FA6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_1600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D85DE14-68AA-43EC-BECF-6E8CBC40AFAC",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_1600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ED84FC8-3E4E-4D29-B725-57AE7EEEC6DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F5C662-A97A-4B1C-AEE9-08724F55B818",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0B21B1-ABA5-49E2-9B43-E85B9B447F45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_25_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A382C1-EA35-44EC-B2EA-4740AA0F7BE5",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_25:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "731B4849-2F0B-4625-B768-2287964ECDAF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_270_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DE753AE-26B3-4549-992A-AC80D578474C",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD008C6-6F0F-40FF-879B-8362DA326686",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC92834-A624-49D8-BF14-9F545C63EB0B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_400_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60BA1C39-04C3-4652-B060-FFD96B3B1C93",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18066544-CD00-41A5-9392-6023020853D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_470_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2D35CB-BFDF-4661-880D-E3EC2576B6F9",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_50_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71DE0BAA-A331-4EA1-A66F-D641D6BF41E9",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A644965-B1B8-4581-BCAC-8D6BCC961A03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C01396B-2F62-42F1-9FE8-A6E762C39269",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30061761-D324-43DD-B43D-F2DFEF987364",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_870_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4633CAF-FD12-4AEF-A994-EED301A41AD0",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz400w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12BD7973-192B-42F7-B880-4E85714A4BDB",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "745643D6-9336-4FBE-9625-99599DFBB8A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz470_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC300FB0-6B64-4EBC-ACA3-50D3BE60C4A8",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz470w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28EB0A22-8096-4784-A1FB-670410EAD0B1",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B04CF80-5FA2-41B8-BD7C-39D498FEEDBF",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09B5BCD-C830-4C67-B966-1CA499F21D04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_2650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "507519D2-3CFF-48FD-AD9F-2B42DADE660A",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_2700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4944BF99-147C-4945-BA19-18C95309904B",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_3650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D064D1A1-DA21-45A1-BA38-519E7EBE5898",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_3700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "882B72E4-5141-4280-819E-C4A80E6A464C",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_4650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9757B0-B0AB-433F-8C85-A8F0CEE44D1F",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_4700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C893FD13-98CF-4C06-9D5E-5B08F3C88D5F",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_5650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BE0BBF9-D363-4106-A805-F86637AFBBD8",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_5700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53DCED63-ADC3-4E82-BABA-D24F76C3DD17",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_6650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E16CA5E-1261-400F-A195-7FC44BBEDA68",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_6700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4273AA33-9129-49FA-9396-3BF0CF297422",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9250_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA4AE1A6-0F7E-4F86-B3A1-484C1DD97092",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60219D0D-240E-4C5E-ADEE-0144DB076F28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9450_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8F74599-442F-4DE1-8BCF-FE38B159AEFA",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "260EAE19-8320-4616-8833-B214D41FA98E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C19936-43F3-4348-9B08-F0897134D791",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F17A77-EB74-4815-A026-6116755EFB37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz500w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABEA6F9B-3E58-42BA-848E-5BD84DC71E15",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA61303F-736E-411F-AEF3-6335C0795138",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6797D1EF-92E1-43E9-92EC-3779B7AAE9F9",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3A454D4-6681-4492-948C-F85AFBB23F06",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4772E1B-F3B7-481F-8B96-980AA0936C74",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AC5E922-DAF7-4F21-96E2-9489387835B6",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506950B-2404-41D2-8EF3-1694777D9EEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz600p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB3A0E77-C70F-4CA8-B35F-4F72A2D128CD",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B4C9916-AD16-4E31-90A6-2AD577EA9783",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz670_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4D07D4B-7D7F-4F92-8746-737356F7446C",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in SonicOS SNMP service resulting exposure of sensitive information to an unauthorized user."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el servicio SNMP de SonicOS resultando en una exposici\u00f3n de informaci\u00f3n confidencial a un usuario no autorizado"
    }
  ],
  "id": "CVE-2022-22276",
  "lastModified": "2024-11-21T06:46:32.533",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-27T17:15:07.337",
  "references": [
    {
      "source": "PSIRT@sonicwall.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
    }
  ],
  "sourceIdentifier": "PSIRT@sonicwall.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "PSIRT@sonicwall.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-22278

Vulnerability from fkie_nvd - Published: 2022-04-27 17:15 - Updated: 2024-11-21 06:46
Summary
A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack
Impacted products
Vendor Product Version
sonicwall tz300p_firmware *
sonicwall tz300p -
sonicwall tz300w_firmware *
sonicwall tz300w -
sonicwall tz350_firmware *
sonicwall tz350 -
sonicwall tz350w_firmware *
sonicwall tz350w -
sonicwall nssp_10700_firmware *
sonicwall nssp_10700 -
sonicwall nssp_11700_firmware *
sonicwall nssp_11700 -
sonicwall nssp_12400_firmware *
sonicwall nssp_12400 -
sonicwall nssp_12800_firmware *
sonicwall nssp_12800 -
sonicwall nssp_13700_firmware *
sonicwall nssp_13700 -
sonicwall nssp_15700_firmware *
sonicwall nssp_15700 -
sonicwall tz370_firmware *
sonicwall tz370 -
sonicwall tz370w_firmware *
sonicwall tz370w -
sonicwall tz400_firmware *
sonicwall tz400 -
sonicwall nsv_10_firmware *
sonicwall nsv_10 -
sonicwall nsv_100_firmware *
sonicwall nsv_100 -
sonicwall nsv_1600_firmware *
sonicwall nsv_1600 -
sonicwall nsv_200_firmware *
sonicwall nsv_200 -
sonicwall nsv_25_firmware *
sonicwall nsv_25 -
sonicwall nsv_270_firmware *
sonicwall nsv_270 -
sonicwall nsv_300_firmware *
sonicwall nsv_300 -
sonicwall nsv_400_firmware *
sonicwall nsv_400 -
sonicwall nsv_470_firmware *
sonicwall nsv_470 -
sonicwall nsv_50_firmware *
sonicwall nsv_50 -
sonicwall nsv_800_firmware *
sonicwall nsv_800 -
sonicwall nsv_870_firmware *
sonicwall nsv_870 -
sonicwall tz400w_firmware *
sonicwall tz400w -
sonicwall tz470_firmware *
sonicwall tz470 -
sonicwall tz470w_firmware *
sonicwall tz470w -
sonicwall tz500_firmware *
sonicwall tz500 -
sonicwall nsa_2650_firmware *
sonicwall nsa_2650 -
sonicwall nsa_2700_firmware *
sonicwall nsa_2700 -
sonicwall nsa_3650_firmware *
sonicwall nsa_3650 -
sonicwall nsa_3700_firmware *
sonicwall nsa_3700 -
sonicwall nsa_4650_firmware *
sonicwall nsa_4650 -
sonicwall nsa_4700_firmware *
sonicwall nsa_4700 -
sonicwall nsa_5650_firmware *
sonicwall nsa_5650 -
sonicwall nsa_5700_firmware *
sonicwall nsa_5700 -
sonicwall nsa_6650_firmware *
sonicwall nsa_6650 -
sonicwall nsa_6700_firmware *
sonicwall nsa_6700 -
sonicwall nsa_9250_firmware *
sonicwall nsa_9250 -
sonicwall nsa_9450_firmware *
sonicwall nsa_9450 -
sonicwall nsa_9650_firmware *
sonicwall nsa_9650 -
sonicwall tz500w_firmware *
sonicwall tz500w -
sonicwall tz570_firmware *
sonicwall tz570 -
sonicwall tz570p_firmware *
sonicwall tz570p -
sonicwall tz570w_firmware *
sonicwall tz570w -
sonicwall tz600_firmware *
sonicwall tz600 -
sonicwall tz600p_firmware *
sonicwall tz600p -
sonicwall tz670_firmware *
sonicwall tz670 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz300p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AFD3B4-E623-4E5E-B6E3-C868A904D099",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7003DBEF-CA74-4429-B567-5CFFB83762E6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz300w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6146E0C8-C5BB-499D-A96D-F389005907A9",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8AC8EAE-99BE-4889-9978-5083F71D7178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz350_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C184C3-B45C-463E-9EEE-93C809C3E30C",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "479B1418-CA62-4B24-A5DB-21F488941754",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz350w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "20B993F6-86CC-4B12-A0FD-BED6D327AAF7",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E0AB47-5EE3-4F2F-B442-DA48C58C44D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_10700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C0B074-3D97-49BB-A3FD-D316FBFE0F95",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_11700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59528209-07F4-461E-B120-5559D4E9DA90",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_12400_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB28494B-45BC-4DA4-913C-6569A898AE01",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2F22AB1-044C-45F1-BD33-82BB46402363",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_12800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B77B8C4-AD73-4C26-91AE-BA66DEA21D11",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E62EAD79-2CD4-4479-B26A-A0C97B5B241A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_13700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FC1D781-9F63-4559-AB61-F22F09DCB915",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nssp_15700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA21425-8435-4BFB-A75C-E53B50AB54B7",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6CF3CF-256C-4C04-8BDF-B16398CD0459",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz370_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE1FC1E2-9445-4563-9003-8110C5E811C3",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz370w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39DBBC2B-24CC-4CF6-A700-090BDC890E94",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz400_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A6FF32-EDAF-4D5E-A365-F1C693498FD8",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50B19A6-80C4-4FF7-9CD5-58938641D3DC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE24F88-E6D3-410F-814E-9C3E7F7B2AAD",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75912A50-E148-43C9-9335-BE19977F8A70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEAFEE2-A23A-47EF-B6C1-E0B554F173CD",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12CF8746-84DF-4FB6-B5B7-AAED39E7FA6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_1600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D85DE14-68AA-43EC-BECF-6E8CBC40AFAC",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_1600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ED84FC8-3E4E-4D29-B725-57AE7EEEC6DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F5C662-A97A-4B1C-AEE9-08724F55B818",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0B21B1-ABA5-49E2-9B43-E85B9B447F45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_25_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A382C1-EA35-44EC-B2EA-4740AA0F7BE5",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_25:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "731B4849-2F0B-4625-B768-2287964ECDAF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_270_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DE753AE-26B3-4549-992A-AC80D578474C",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD008C6-6F0F-40FF-879B-8362DA326686",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC92834-A624-49D8-BF14-9F545C63EB0B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_400_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60BA1C39-04C3-4652-B060-FFD96B3B1C93",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18066544-CD00-41A5-9392-6023020853D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_470_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2D35CB-BFDF-4661-880D-E3EC2576B6F9",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_50_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71DE0BAA-A331-4EA1-A66F-D641D6BF41E9",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A644965-B1B8-4581-BCAC-8D6BCC961A03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C01396B-2F62-42F1-9FE8-A6E762C39269",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30061761-D324-43DD-B43D-F2DFEF987364",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsv_870_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4633CAF-FD12-4AEF-A994-EED301A41AD0",
              "versionEndExcluding": "7.0.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz400w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12BD7973-192B-42F7-B880-4E85714A4BDB",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "745643D6-9336-4FBE-9625-99599DFBB8A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz470_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC300FB0-6B64-4EBC-ACA3-50D3BE60C4A8",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz470w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28EB0A22-8096-4784-A1FB-670410EAD0B1",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B04CF80-5FA2-41B8-BD7C-39D498FEEDBF",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09B5BCD-C830-4C67-B966-1CA499F21D04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_2650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "507519D2-3CFF-48FD-AD9F-2B42DADE660A",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_2700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4944BF99-147C-4945-BA19-18C95309904B",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_3650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D064D1A1-DA21-45A1-BA38-519E7EBE5898",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_3700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "882B72E4-5141-4280-819E-C4A80E6A464C",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_4650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9757B0-B0AB-433F-8C85-A8F0CEE44D1F",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_4700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C893FD13-98CF-4C06-9D5E-5B08F3C88D5F",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_5650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BE0BBF9-D363-4106-A805-F86637AFBBD8",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_5700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53DCED63-ADC3-4E82-BABA-D24F76C3DD17",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_6650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E16CA5E-1261-400F-A195-7FC44BBEDA68",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_6700_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4273AA33-9129-49FA-9396-3BF0CF297422",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9250_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA4AE1A6-0F7E-4F86-B3A1-484C1DD97092",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60219D0D-240E-4C5E-ADEE-0144DB076F28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9450_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8F74599-442F-4DE1-8BCF-FE38B159AEFA",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "260EAE19-8320-4616-8833-B214D41FA98E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:nsa_9650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C19936-43F3-4348-9B08-F0897134D791",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F17A77-EB74-4815-A026-6116755EFB37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz500w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABEA6F9B-3E58-42BA-848E-5BD84DC71E15",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA61303F-736E-411F-AEF3-6335C0795138",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6797D1EF-92E1-43E9-92EC-3779B7AAE9F9",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3A454D4-6681-4492-948C-F85AFBB23F06",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz570w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4772E1B-F3B7-481F-8B96-980AA0936C74",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AC5E922-DAF7-4F21-96E2-9489387835B6",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506950B-2404-41D2-8EF3-1694777D9EEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz600p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB3A0E77-C70F-4CA8-B35F-4F72A2D128CD",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B4C9916-AD16-4E31-90A6-2AD577EA9783",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:tz670_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4D07D4B-7D7F-4F92-8746-737356F7446C",
              "versionEndExcluding": "7.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack"
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en SonicOS CFS (servicio de filtrado de contenidos) devuelve un gran mensaje de respuesta HTTP 403 prohibido a la direcci\u00f3n de origen cuando usuarios intentan acceder a un recurso prohibido, lo que permite a un atacante causar un ataque de Denegaci\u00f3n de Servicio HTTP (DoS)"
    }
  ],
  "id": "CVE-2022-22278",
  "lastModified": "2024-11-21T06:46:32.857",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-27T17:15:07.453",
  "references": [
    {
      "source": "PSIRT@sonicwall.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
    }
  ],
  "sourceIdentifier": "PSIRT@sonicwall.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "PSIRT@sonicwall.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2022-47522 (GCVE-0-2022-47522)

Vulnerability from cvelistv5 – Published: 2023-04-15 00:00 – Updated: 2025-02-06 15:54
VLAI?
Summary
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:55:08.299Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wi-fi.org/discover-wi-fi/passpoint"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://papers.mathyvanhoef.com/usenix2023-wifi.pdf"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-47522",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-06T15:53:42.575080Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-290",
                "description": "CWE-290 Authentication Bypass by Spoofing",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-06T15:54:53.804Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target\u0027s MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target\u0027s original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client\u0027s pairwise encryption key."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-07T05:52:20.794Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.wi-fi.org/discover-wi-fi/passpoint"
        },
        {
          "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006"
        },
        {
          "url": "https://papers.mathyvanhoef.com/usenix2023-wifi.pdf"
        },
        {
          "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-47522",
    "datePublished": "2023-04-15T00:00:00.000Z",
    "dateReserved": "2022-12-18T00:00:00.000Z",
    "dateUpdated": "2025-02-06T15:54:53.804Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-22278 (GCVE-0-2022-22278)

Vulnerability from cvelistv5 – Published: 2022-04-27 16:25 – Updated: 2024-08-03 03:07
VLAI?
Summary
A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack
Severity ?
No CVSS data available.
CWE
  • CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
References
Impacted products
Vendor Product Version
SonicWall SonicOS Affected: SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions.
Affected: SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions.
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:07:50.277Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SonicOS",
          "vendor": "SonicWall",
          "versions": [
            {
              "status": "affected",
              "version": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770: Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-27T16:25:18",
        "orgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
        "shortName": "sonicwall"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT@sonicwall.com",
          "ID": "CVE-2022-22278",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SonicOS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SonicWall"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-770: Allocation of Resources Without Limits or Throttling"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004",
              "refsource": "CONFIRM",
              "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
    "assignerShortName": "sonicwall",
    "cveId": "CVE-2022-22278",
    "datePublished": "2022-04-27T16:25:18",
    "dateReserved": "2021-12-29T00:00:00",
    "dateUpdated": "2024-08-03T03:07:50.277Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-22277 (GCVE-0-2022-22277)

Vulnerability from cvelistv5 – Published: 2022-04-27 16:25 – Updated: 2024-08-03 03:07
VLAI?
Summary
A vulnerability in SonicOS SNMP service resulting exposure of Wireless Access Point sensitive information in cleartext.
Severity ?
No CVSS data available.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
Vendor Product Version
SonicWall SonicOS Affected: SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions.
Affected: SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions.
Affected: SonicOS Gen 6 6.5.4.9-93n and earlier versions.
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:07:50.394Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SonicOS",
          "vendor": "SonicWall",
          "versions": [
            {
              "status": "affected",
              "version": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 6 6.5.4.9-93n and earlier versions."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in SonicOS SNMP service resulting exposure of Wireless Access Point sensitive information in cleartext."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-27T16:25:16",
        "orgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
        "shortName": "sonicwall"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT@sonicwall.com",
          "ID": "CVE-2022-22277",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SonicOS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 6 6.5.4.9-93n and earlier versions."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SonicWall"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in SonicOS SNMP service resulting exposure of Wireless Access Point sensitive information in cleartext."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004",
              "refsource": "CONFIRM",
              "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
    "assignerShortName": "sonicwall",
    "cveId": "CVE-2022-22277",
    "datePublished": "2022-04-27T16:25:16",
    "dateReserved": "2021-12-29T00:00:00",
    "dateUpdated": "2024-08-03T03:07:50.394Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-22276 (GCVE-0-2022-22276)

Vulnerability from cvelistv5 – Published: 2022-04-27 16:25 – Updated: 2024-08-03 03:07
VLAI?
Summary
A vulnerability in SonicOS SNMP service resulting exposure of sensitive information to an unauthorized user.
Severity ?
No CVSS data available.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
Vendor Product Version
SonicWall SonicOS Affected: SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions.
Affected: SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions.
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:07:50.191Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SonicOS",
          "vendor": "SonicWall",
          "versions": [
            {
              "status": "affected",
              "version": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in SonicOS SNMP service resulting exposure of sensitive information to an unauthorized user."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-27T16:25:15",
        "orgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
        "shortName": "sonicwall"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT@sonicwall.com",
          "ID": "CVE-2022-22276",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SonicOS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SonicWall"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in SonicOS SNMP service resulting exposure of sensitive information to an unauthorized user."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004",
              "refsource": "CONFIRM",
              "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
    "assignerShortName": "sonicwall",
    "cveId": "CVE-2022-22276",
    "datePublished": "2022-04-27T16:25:15",
    "dateReserved": "2021-12-29T00:00:00",
    "dateUpdated": "2024-08-03T03:07:50.191Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-47522 (GCVE-0-2022-47522)

Vulnerability from nvd – Published: 2023-04-15 00:00 – Updated: 2025-02-06 15:54
VLAI?
Summary
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:55:08.299Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wi-fi.org/discover-wi-fi/passpoint"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://papers.mathyvanhoef.com/usenix2023-wifi.pdf"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-47522",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-06T15:53:42.575080Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-290",
                "description": "CWE-290 Authentication Bypass by Spoofing",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-06T15:54:53.804Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target\u0027s MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target\u0027s original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client\u0027s pairwise encryption key."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-07T05:52:20.794Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.wi-fi.org/discover-wi-fi/passpoint"
        },
        {
          "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006"
        },
        {
          "url": "https://papers.mathyvanhoef.com/usenix2023-wifi.pdf"
        },
        {
          "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-47522",
    "datePublished": "2023-04-15T00:00:00.000Z",
    "dateReserved": "2022-12-18T00:00:00.000Z",
    "dateUpdated": "2025-02-06T15:54:53.804Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-22278 (GCVE-0-2022-22278)

Vulnerability from nvd – Published: 2022-04-27 16:25 – Updated: 2024-08-03 03:07
VLAI?
Summary
A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack
Severity ?
No CVSS data available.
CWE
  • CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
References
Impacted products
Vendor Product Version
SonicWall SonicOS Affected: SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions.
Affected: SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions.
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:07:50.277Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SonicOS",
          "vendor": "SonicWall",
          "versions": [
            {
              "status": "affected",
              "version": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770: Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-27T16:25:18",
        "orgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
        "shortName": "sonicwall"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT@sonicwall.com",
          "ID": "CVE-2022-22278",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SonicOS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SonicWall"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-770: Allocation of Resources Without Limits or Throttling"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004",
              "refsource": "CONFIRM",
              "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
    "assignerShortName": "sonicwall",
    "cveId": "CVE-2022-22278",
    "datePublished": "2022-04-27T16:25:18",
    "dateReserved": "2021-12-29T00:00:00",
    "dateUpdated": "2024-08-03T03:07:50.277Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-22277 (GCVE-0-2022-22277)

Vulnerability from nvd – Published: 2022-04-27 16:25 – Updated: 2024-08-03 03:07
VLAI?
Summary
A vulnerability in SonicOS SNMP service resulting exposure of Wireless Access Point sensitive information in cleartext.
Severity ?
No CVSS data available.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
Vendor Product Version
SonicWall SonicOS Affected: SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions.
Affected: SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions.
Affected: SonicOS Gen 6 6.5.4.9-93n and earlier versions.
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:07:50.394Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SonicOS",
          "vendor": "SonicWall",
          "versions": [
            {
              "status": "affected",
              "version": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 6 6.5.4.9-93n and earlier versions."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in SonicOS SNMP service resulting exposure of Wireless Access Point sensitive information in cleartext."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-27T16:25:16",
        "orgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
        "shortName": "sonicwall"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT@sonicwall.com",
          "ID": "CVE-2022-22277",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SonicOS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 6 6.5.4.9-93n and earlier versions."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SonicWall"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in SonicOS SNMP service resulting exposure of Wireless Access Point sensitive information in cleartext."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004",
              "refsource": "CONFIRM",
              "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
    "assignerShortName": "sonicwall",
    "cveId": "CVE-2022-22277",
    "datePublished": "2022-04-27T16:25:16",
    "dateReserved": "2021-12-29T00:00:00",
    "dateUpdated": "2024-08-03T03:07:50.394Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-22276 (GCVE-0-2022-22276)

Vulnerability from nvd – Published: 2022-04-27 16:25 – Updated: 2024-08-03 03:07
VLAI?
Summary
A vulnerability in SonicOS SNMP service resulting exposure of sensitive information to an unauthorized user.
Severity ?
No CVSS data available.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
Vendor Product Version
SonicWall SonicOS Affected: SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions.
Affected: SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions.
Affected: SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions.
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:07:50.191Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SonicOS",
          "vendor": "SonicWall",
          "versions": [
            {
              "status": "affected",
              "version": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
            },
            {
              "status": "affected",
              "version": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in SonicOS SNMP service resulting exposure of sensitive information to an unauthorized user."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-27T16:25:15",
        "orgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
        "shortName": "sonicwall"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT@sonicwall.com",
          "ID": "CVE-2022-22276",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SonicOS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions."
                          },
                          {
                            "version_value": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SonicWall"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in SonicOS SNMP service resulting exposure of sensitive information to an unauthorized user."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004",
              "refsource": "CONFIRM",
              "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44b2ff79-1416-4492-88bb-ed0da00c7315",
    "assignerShortName": "sonicwall",
    "cveId": "CVE-2022-22276",
    "datePublished": "2022-04-27T16:25:15",
    "dateReserved": "2021-12-29T00:00:00",
    "dateUpdated": "2024-08-03T03:07:50.191Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}