cve-2022-22275
Vulnerability from cvelistv5
Published
2022-04-27 16:25
Modified
2024-08-03 03:07
Severity ?
EPSS score ?
Summary
Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable.
References
▼ | URL | Tags | |
---|---|---|---|
PSIRT@sonicwall.com | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004 | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.213Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SonicOS", "vendor": "SonicWall", "versions": [ { "status": "affected", "version": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions." }, { "status": "affected", "version": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions." }, { "status": "affected", "version": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions." }, { "status": "affected", "version": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions." } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-27T16:25:13", "orgId": "44b2ff79-1416-4492-88bb-ed0da00c7315", "shortName": "sonicwall" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT@sonicwall.com", "ID": "CVE-2022-22275", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SonicOS", "version": { "version_data": [ { "version_value": "SonicOS Gen 7 TZ-Series 7.0.1-5030-R2007 and earlier versions." }, { "version_value": "SonicOS Gen 7 NSa-Series 7.0.1-5030-R2007 and earlier versions." }, { "version_value": "SonicOS Gen 7 NSv-Series 7.0.1.0-5030-1391 and earlier versions." }, { "version_value": "SonicOS Gen 7 NSsp-Series 7.0.1-5030-R780 and earlier versions." } ] } } ] }, "vendor_name": "SonicWall" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004", "refsource": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004" } ] } } } }, "cveMetadata": { "assignerOrgId": "44b2ff79-1416-4492-88bb-ed0da00c7315", "assignerShortName": "sonicwall", "cveId": "CVE-2022-22275", "datePublished": "2022-04-27T16:25:13", "dateReserved": "2021-12-29T00:00:00", "dateUpdated": "2024-08-03T03:07:50.213Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-22275\",\"sourceIdentifier\":\"PSIRT@sonicwall.com\",\"published\":\"2022-04-27T17:15:07.273\",\"lastModified\":\"2022-05-12T02:49:58.330\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable.\"},{\"lang\":\"es\",\"value\":\"Una Restricci\u00f3n Inapropiada del Canal de Comunicaci\u00f3n TCP en el tr\u00e1fico de entrada HTTP/S de la WAN a la DMZ omitiendo la pol\u00edtica de seguridad hasta el apret\u00f3n de manos TCP, resultando potencialmente en un ataque de Denegaci\u00f3n de Servicio (DoS) si el host de destino es vulnerable\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"PSIRT@sonicwall.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0.0\",\"versionEndIncluding\":\"7.0.1-5030-r2007\",\"matchCriteriaId\":\"F8464F67-85C1-4E80-AE4B-C121BD8F93AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D8B0C7A-FD65-47CA-A625-150A90EFA7A1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"043858A6-26AC-4EB0-A240-A43AD08C6AD5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A69E000B-5806-46FD-A233-4E2CC9DD38D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73BB9452-A014-4A68-9662-63E6C60EEAD2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FAAEBB4-F180-4195-BA7F-591AB02EEDC9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C15FED5-C48C-47CF-9645-0563D77883C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A884B1BB-F201-4C77-9F6E-B8A884DCD4C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60219D0D-240E-4C5E-ADEE-0144DB076F28\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260EAE19-8320-4616-8833-B214D41FA98E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F17A77-EB74-4815-A026-6116755EFB37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E8F3935-89B4-4091-9B8C-442C02FD4F3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70340DD4-687B-402C-85AF-C2B80D0F1600\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52847BA2-470B-4078-A79B-52095DB9214B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09678BBE-7603-41D2-BF09-415CA33C7EFA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7003DBEF-CA74-4429-B567-5CFFB83762E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8AC8EAE-99BE-4889-9978-5083F71D7178\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479B1418-CA62-4B24-A5DB-21F488941754\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E0AB47-5EE3-4F2F-B442-DA48C58C44D6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9853AE3A-B0EA-4249-AA7D-1F2051C9BF91\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DBDD10C-F89D-4051-BC70-67B41167FF9B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50B19A6-80C4-4FF7-9CD5-58938641D3DC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"745643D6-9336-4FBE-9625-99599DFBB8A2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C23940E-2F9D-447B-A740-42035ED5D400\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90C790AD-C40E-4527-8F83-D278282A9600\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C09B5BCD-C830-4C67-B966-1CA499F21D04\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA61303F-736E-411F-AEF3-6335C0795138\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"352DFCF9-E333-41C0-8033-91265768FD8E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C882C38-9DA5-4C03-BB23-AB2B448E3307\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3506950B-2404-41D2-8EF3-1694777D9EEA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B4C9916-AD16-4E31-90A6-2AD577EA9783\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0.0\",\"versionEndIncluding\":\"7.0.1.0-5030-1391\",\"matchCriteriaId\":\"01B222A9-64C3-4C64-8707-0F53B2BA636B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsv_10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75912A50-E148-43C9-9335-BE19977F8A70\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsv_100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12CF8746-84DF-4FB6-B5B7-AAED39E7FA6C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsv_200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC0B21B1-ABA5-49E2-9B43-E85B9B447F45\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsv_25:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"731B4849-2F0B-4625-B768-2287964ECDAF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2ABC8D8-2943-4073-9568-E87961A18998\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsv_300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC92834-A624-49D8-BF14-9F545C63EB0B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsv_400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18066544-CD00-41A5-9392-6023020853D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F57D527-AA3F-45E9-9BCE-6F76691066B5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsv_50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A644965-B1B8-4581-BCAC-8D6BCC961A03\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsv_800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30061761-D324-43DD-B43D-F2DFEF987364\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0.0\",\"versionEndIncluding\":\"7.0.1-5030-r780\",\"matchCriteriaId\":\"BA61E6BD-4873-4A78-9A64-D645923D68A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C3BA5A3-1160-4793-A8D6-40B9D264BCC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6739DEA3-06FF-4FEB-9931-0DB27F63B70E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F22AB1-044C-45F1-BD33-82BB46402363\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E62EAD79-2CD4-4479-B26A-A0C97B5B241A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0250EDF9-0AEF-4711-8EF6-D447CF48BCAF\"}]}]}],\"references\":[{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004\",\"source\":\"PSIRT@sonicwall.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.