ID

VAR-202204-1365


CVE

CVE-2022-22279


TITLE

plural  SonicWALL  Product certification vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2022-008412

DESCRIPTION

A post-authentication arbitrary file read vulnerability impacting end-of-life Secure Remote Access (SRA) products and older firmware versions of Secure Mobile Access (SMA) 100 series products, specifically the SRA appliances running all 8.x, 9.0.0.5-19sv and earlier versions and Secure Mobile Access (SMA) 100 series products running older firmware 9.0.0.9-26sv and earlier versions. ** Not supported ** This is a vulnerability in an unsupported product. sra 1200 firmware, sra 4200 firmware, SMA210 firmware etc. SonicWALL The product contains authentication vulnerabilities.Information may be obtained

Trust: 1.71

sources: NVD: CVE-2022-22279 // JVNDB: JVNDB-2022-008412 // VULMON: CVE-2022-22279

AFFECTED PRODUCTS

vendor:sonicwallmodel:sra 4200scope:lteversion:9.0.0.5-19sv

Trust: 1.0

vendor:sonicwallmodel:sma 500vscope:ltversion:9.0.0.10-28sv

Trust: 1.0

vendor:sonicwallmodel:sma 210scope:ltversion:9.0.0.10-28sv

Trust: 1.0

vendor:sonicwallmodel:sra 1200scope:lteversion:9.0.0.5-19sv

Trust: 1.0

vendor:sonicwallmodel:sma 410scope:ltversion:9.0.0.10-28sv

Trust: 1.0

vendor:sonicwallmodel:sma210scope: - version: -

Trust: 0.8

vendor:sonicwallmodel:sma410scope: - version: -

Trust: 0.8

vendor:sonicwallmodel:sra 1200scope: - version: -

Trust: 0.8

vendor:sonicwallmodel:sma500vscope: - version: -

Trust: 0.8

vendor:sonicwallmodel:sra 4200scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-008412 // NVD: CVE-2022-22279

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-22279
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-22279
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202204-3327
value: MEDIUM

Trust: 0.6

VULMON: CVE-2022-22279
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-22279
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2022-22279
baseSeverity: MEDIUM
baseScore: 4.9
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.2
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-22279
baseSeverity: MEDIUM
baseScore: 4.9
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2022-22279 // JVNDB: JVNDB-2022-008412 // CNNVD: CNNVD-202204-3327 // NVD: CVE-2022-22279

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.0

problemtype:CWE-23

Trust: 1.0

problemtype:Inappropriate authentication (CWE-287) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-008412 // NVD: CVE-2022-22279

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202204-3327

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202204-3327

PATCH

title:Sonicwall SonicWall SSLVPN Repair measures for path traversal vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=247257

Trust: 0.6

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-RCE

Trust: 0.1

sources: VULMON: CVE-2022-22279 // CNNVD: CNNVD-202204-3327

EXTERNAL IDS

db:NVDid:CVE-2022-22279

Trust: 3.3

db:JVNDBid:JVNDB-2022-008412

Trust: 0.8

db:CS-HELPid:SB2022041325

Trust: 0.6

db:CNNVDid:CNNVD-202204-3327

Trust: 0.6

db:VULMONid:CVE-2022-22279

Trust: 0.1

sources: VULMON: CVE-2022-22279 // JVNDB: JVNDB-2022-008412 // CNNVD: CNNVD-202204-3327 // NVD: CVE-2022-22279

REFERENCES

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2022-0006

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-22279

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-22279/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022041325

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/22.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

sources: VULMON: CVE-2022-22279 // JVNDB: JVNDB-2022-008412 // CNNVD: CNNVD-202204-3327 // NVD: CVE-2022-22279

SOURCES

db:VULMONid:CVE-2022-22279
db:JVNDBid:JVNDB-2022-008412
db:CNNVDid:CNNVD-202204-3327
db:NVDid:CVE-2022-22279

LAST UPDATE DATE

2024-08-14T15:01:04.298000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-22279date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2022-008412date:2023-07-26T08:26:00
db:CNNVDid:CNNVD-202204-3327date:2023-07-25T00:00:00
db:NVDid:CVE-2022-22279date:2024-08-03T03:16:16.560

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-22279date:2022-04-13T00:00:00
db:JVNDBid:JVNDB-2022-008412date:2023-07-26T00:00:00
db:CNNVDid:CNNVD-202204-3327date:2022-04-13T00:00:00
db:NVDid:CVE-2022-22279date:2022-04-13T06:15:07.177