First published: Fri Jul 29 2022(Updated: )
Improper neutralization of special elements used in a user input allows an authenticated malicious user to perform remote code execution in the host system. This vulnerability impacts SonicWall Switch 1.1.1.0-2s and earlier versions
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sonicwall Sws12-10fpoe Firmware | <1.2.0.0-3 | |
Sonicwall Sws12-10fpoe | ||
Sonicwall Sws12-8 Firmware | <1.2.0.0-3 | |
Sonicwall Sws12-8 | ||
Sonicwall Sws12-8poe Firmware | <1.2.0.0-3 | |
Sonicwall Sws12-8poe | ||
Sonicwall Sws14-24 Firmware | <1.2.0.0-3 | |
Sonicwall Sws14-24 | ||
Sonicwall Sws14-24fpoe Firmware | <1.2.0.0-3 | |
Sonicwall Sws14-24fpoe | ||
Sonicwall Sws14-48 Firmware | <1.2.0.0-3 | |
Sonicwall Sws14-48 | ||
Sonicwall Sws14-48fpoe Firmware | <1.2.0.0-3 | |
Sonicwall Sws14-48fpoe |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-2323.
The severity of CVE-2022-2323 is high with a CVSS score of 8.8.
SonicWall Switch 1.1.1.0-2s and earlier versions are affected by CVE-2022-2323.
CVE-2022-2323 allows an authenticated malicious user to perform remote code execution in the host system.
You can find more information about CVE-2022-2323 [here](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0013).