Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable.
References
Link | Resource |
---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2022-04-27 17:15
Updated : 2022-05-12 02:49
NVD link : CVE-2022-22275
Mitre link : CVE-2022-22275
CVE.ORG link : CVE-2022-22275
JSON object : View
Products Affected
sonicwall
- tz270w
- tz300w
- tz350
- nsa_5700
- soho_250w
- nsa_9650
- nsa_9250
- nsa_2700
- nsa_6650
- nsv_800
- tz400w
- nsa_4650
- tz270
- nsv_50
- nsa_4700
- tz600
- nssp_11700
- nsa_3700
- nsv_25
- nsa_2650
- tz500
- nsv_270
- nsv_870
- nssp_10700
- tz370
- tz570p
- nsv_10
- tz350w
- tz470
- nsv_470
- nsa_9450
- nsa_5650
- tz670
- nsv_100
- tz600p
- nsa_3650
- sonicos
- tz470w
- tz570w
- tz300p
- tz370w
- nsa_6700
- nsv_300
- tz570
- nssp_12800
- nssp_13700
- nsv_400
- nssp_12400
- tz400
- tz500w
- tz300
- nsv_200
- soho_250
CWE