ID

VAR-202207-1096


CVE

CVE-2022-2324


TITLE

SonicWALL  of  email security  Spoofing authentication evasion vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-014189

DESCRIPTION

Improperly Implemented Security Check vulnerability in the SonicWall Hosted Email Security leads to bypass of Capture ATP security service in the appliance. This vulnerability impacts 10.0.17.7319 and earlier versions. SonicWALL of email security Exists in spoofing authentication evasion vulnerabilities.Information may be tampered with

Trust: 1.8

sources: NVD: CVE-2022-2324 // JVNDB: JVNDB-2022-014189 // VULHUB: VHN-430240 // VULMON: CVE-2022-2324

AFFECTED PRODUCTS

vendor:sonicwallmodel:email securityscope:lteversion:10.0.17.7319

Trust: 1.0

vendor:sonicwallmodel:email securityscope:lteversion:10.0.17.7319 and earlier

Trust: 0.8

vendor:sonicwallmodel:email securityscope: - version: -

Trust: 0.8

vendor:sonicwallmodel:email securityscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-014189 // NVD: CVE-2022-2324

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-2324
value: HIGH

Trust: 1.0

NVD: CVE-2022-2324
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202207-1379
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-2324
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-2324
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-014189 // CNNVD: CNNVD-202207-1379 // NVD: CVE-2022-2324

PROBLEMTYPE DATA

problemtype:CWE-290

Trust: 1.1

problemtype:CWE-358

Trust: 1.0

problemtype:Avoid authentication by spoofing (CWE-290) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-430240 // JVNDB: JVNDB-2022-014189 // NVD: CVE-2022-2324

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202207-1379

TYPE

security feature problem

Trust: 0.6

sources: CNNVD: CNNVD-202207-1379

PATCH

title:SonicWALL Hosted Email Security Fixing measures for security feature vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=202895

Trust: 0.6

sources: CNNVD: CNNVD-202207-1379

EXTERNAL IDS

db:NVDid:CVE-2022-2324

Trust: 3.4

db:JVNDBid:JVNDB-2022-014189

Trust: 0.8

db:CS-HELPid:SB2022071506

Trust: 0.6

db:CNNVDid:CNNVD-202207-1379

Trust: 0.6

db:VULHUBid:VHN-430240

Trust: 0.1

db:VULMONid:CVE-2022-2324

Trust: 0.1

sources: VULHUB: VHN-430240 // VULMON: CVE-2022-2324 // JVNDB: JVNDB-2022-014189 // CNNVD: CNNVD-202207-1379 // NVD: CVE-2022-2324

REFERENCES

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2022-0014

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-2324

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-2324/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071506

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-430240 // VULMON: CVE-2022-2324 // JVNDB: JVNDB-2022-014189 // CNNVD: CNNVD-202207-1379 // NVD: CVE-2022-2324

SOURCES

db:VULHUBid:VHN-430240
db:VULMONid:CVE-2022-2324
db:JVNDBid:JVNDB-2022-014189
db:CNNVDid:CNNVD-202207-1379
db:NVDid:CVE-2022-2324

LAST UPDATE DATE

2024-08-14T14:02:30.834000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-430240date:2022-08-08T00:00:00
db:VULMONid:CVE-2022-2324date:2022-08-01T00:00:00
db:JVNDBid:JVNDB-2022-014189date:2023-09-14T08:14:00
db:CNNVDid:CNNVD-202207-1379date:2022-08-09T00:00:00
db:NVDid:CVE-2022-2324date:2022-08-08T18:07:45.857

SOURCES RELEASE DATE

db:VULHUBid:VHN-430240date:2022-07-29T00:00:00
db:VULMONid:CVE-2022-2324date:2022-07-29T00:00:00
db:JVNDBid:JVNDB-2022-014189date:2023-09-14T00:00:00
db:CNNVDid:CNNVD-202207-1379date:2022-07-15T00:00:00
db:NVDid:CVE-2022-2324date:2022-07-29T21:15:09.537