Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable.
References
Link | Resource |
---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2022-04-27 10:15
Updated : 2022-05-11 19:49
NVD link : CVE-2022-22275
Mitre link : CVE-2022-22275
JSON object : View
CWE
Products Affected
sonicwall
- tz500w
- tz570w
- nsa_5650
- nsa_4700
- tz500
- nsv_10
- tz350
- tz570
- nsa_9250
- nssp_11700
- tz370w
- tz370
- nsv_200
- tz670
- nsv_470
- nsa_9650
- tz400w
- nsv_400
- nsa_5700
- nssp_10700
- nsa_3700
- tz270
- nsa_9450
- nsv_270
- tz300p
- nssp_13700
- nsa_3650
- tz470w
- tz600
- tz270w
- nsv_800
- tz350w
- sonicos
- tz570p
- nsv_300
- tz300
- soho_250w
- tz600p
- nsv_870
- soho_250
- nsv_50
- nsv_25
- nsa_4650
- nsa_2650
- nsv_100
- nssp_12800
- tz400
- nsa_6650
- tz470
- nssp_12400
- nsa_6700
- tz300w
- nsa_2700