Versio.io

CVE-2022-22275

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 27-04-2022 07:15
Last modified: - 12-05-2022 04:49
Total changes: - 2

Description

Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Low
Attack complexity
Network
Attack vector
High
Availability
None
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
7.5
Base score
3.9
3.6
Exploitability score
Impact score
 

Verification logic

OR
AND
OR
vendor=sonicwall AND product=sonicos AND versionEndIncluding=7.0.1-5030-r2007 AND versionStartIncluding=7.0.0.0
OR
vendor=sonicwall AND product=tz670 AND version=-
vendor=sonicwall AND product=tz570 AND version=-
vendor=sonicwall AND product=tz470 AND version=-
vendor=sonicwall AND product=tz470w AND version=-
vendor=sonicwall AND product=tz570p AND version=-
vendor=sonicwall AND product=tz570w AND version=-
vendor=sonicwall AND product=tz270 AND version=-
vendor=sonicwall AND product=tz270w AND version=-
vendor=sonicwall AND product=tz370 AND version=-
vendor=sonicwall AND product=tz370w AND version=-
vendor=sonicwall AND product=soho_250 AND version=-
vendor=sonicwall AND product=soho_250w AND version=-
vendor=sonicwall AND product=nsa_2650 AND version=-
vendor=sonicwall AND product=nsa_2700 AND version=-
vendor=sonicwall AND product=nsa_3700 AND version=-
vendor=sonicwall AND product=nsa_4700 AND version=-
vendor=sonicwall AND product=nsa_6700 AND version=-
vendor=sonicwall AND product=nsa_9450 AND version=-
vendor=sonicwall AND product=nsa_9650 AND version=-
vendor=sonicwall AND product=tz300 AND version=-
vendor=sonicwall AND product=tz300p AND version=-
vendor=sonicwall AND product=tz300w AND version=-
vendor=sonicwall AND product=tz350 AND version=-
vendor=sonicwall AND product=tz350w AND version=-
vendor=sonicwall AND product=tz400 AND version=-
vendor=sonicwall AND product=tz400w AND version=-
vendor=sonicwall AND product=tz500 AND version=-
vendor=sonicwall AND product=tz500w AND version=-
vendor=sonicwall AND product=tz600 AND version=-
vendor=sonicwall AND product=tz600p AND version=-
vendor=sonicwall AND product=nsa_3650 AND version=-
vendor=sonicwall AND product=nsa_4650 AND version=-
vendor=sonicwall AND product=nsa_5650 AND version=-
vendor=sonicwall AND product=nsa_5700 AND version=-
vendor=sonicwall AND product=nsa_6650 AND version=-
vendor=sonicwall AND product=nsa_9250 AND version=-
AND
OR
vendor=sonicwall AND product=sonicos AND versionEndIncluding=7.0.1.0-5030-1391 AND versionStartIncluding=7.0.0.0
OR
vendor=sonicwall AND product=nsv_200 AND version=-
vendor=sonicwall AND product=nsv_270 AND version=-
vendor=sonicwall AND product=nsv_300 AND version=-
vendor=sonicwall AND product=nsv_400 AND version=-
vendor=sonicwall AND product=nsv_470 AND version=-
vendor=sonicwall AND product=nsv_800 AND version=-
vendor=sonicwall AND product=nsv_870 AND version=-
vendor=sonicwall AND product=nsv_10 AND version=-
vendor=sonicwall AND product=nsv_100 AND version=-
vendor=sonicwall AND product=nsv_25 AND version=-
vendor=sonicwall AND product=nsv_50 AND version=-
AND
OR
vendor=sonicwall AND product=sonicos AND versionEndIncluding=7.0.1-5030-r780 AND versionStartIncluding=7.0.0.0
OR
vendor=sonicwall AND product=nssp_12400 AND version=-
vendor=sonicwall AND product=nssp_12800 AND version=-
vendor=sonicwall AND product=nssp_13700 AND version=-
vendor=sonicwall AND product=nssp_10700 AND version=-
vendor=sonicwall AND product=nssp_11700 AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2022-22275

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.