First published: Wed Apr 27 2022(Updated: )
Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SonicOS | >=7.0.0.0<=7.0.1-5030-r2007 | |
SonicWall NSA 2650 | ||
SonicWall NSA 2700 | ||
SonicWall NSA 3650 Firmware | ||
SonicWall NSA 3700 Firmware | ||
SonicWall NSA 4650 Firmware | ||
SonicWall NSA 4700 | ||
SonicWall NSA 5650 | ||
SonicWall NSA 5700 | ||
SonicWall NSA 6650 | ||
SonicWall NSA 6700 Firmware | ||
SonicWall NSA 9250 | ||
SonicWall NSA 9450 | ||
SonicWall NSA 9650 | ||
SonicWall SOHO 250W | ||
SonicWall SOHO 250W Firmware | ||
SonicWall TZ270 | ||
SonicWall TZ270W Firmware | ||
SonicWall TZ300 Firmware | ||
SonicWall TZ300P Firmware | ||
SonicWall TZ300W Firmware | ||
SonicWall TZ350 Firmware | ||
SonicWall TZ350W Firmware | ||
SonicWall TZ370 | ||
SonicWall TZ370W Firmware | ||
SonicWall TZ400W Firmware | ||
SonicWall TZ400W Firmware | ||
SonicWall TZ470 Firmware | ||
SonicWall TZ470W Firmware | ||
SonicWall TZ500W | ||
SonicWall TZ500W Firmware | ||
SonicWall TZ570 Firmware | ||
SonicWall TZ570P Firmware | ||
SonicWall TZ570W Firmware | ||
SonicWall TZ600 | ||
SonicWall TZ 600P | ||
SonicWall TZ670 Firmware | ||
SonicWall SonicOS | >=7.0.0.0<=7.0.1.0-5030-1391 | |
SonicWall NSV 10 Firmware | ||
SonicWall NSV 100 Firmware | ||
SonicWall NSv | ||
SonicWall NSv 25 | ||
SonicWall NSV 270 | ||
SonicWall NSV 300 | ||
SonicWall NSV 400 Firmware | ||
SonicWall NSV 470 Firmware | ||
SonicWall NSV 50 Firmware | ||
SonicWall NSV800 | ||
SonicWall NSv 870 | ||
SonicWall SonicOS | >=7.0.0.0<=7.0.1-5030-r780 | |
SonicWall NSSP 10700 Firmware | ||
SonicWall NSSP 11700 | ||
SonicWall NSSP 12400 Firmware | ||
SonicWall NSSP 12800 Firmware | ||
SonicWall NSSP 13700 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22275 is a vulnerability that allows for improper restriction of TCP communication channel in HTTP/S inbound traffic, potentially resulting in a Denial of Service (DoS) attack.
SonicWall SonicOS versions 7.0.0.0 to 7.0.1-5030-r2007 are affected by CVE-2022-22275.
CVE-2022-22275 has a severity rating of 7.5, indicating a high severity.
To fix CVE-2022-22275, it is recommended to update to a patched version of SonicWall SonicOS.
You can find more information about CVE-2022-22275 on the SonicWall PSIRT website.