First published: Wed Aug 24 2022(Updated: )
Flooding SNS firewall versions 3.7.0 to 3.7.29, 3.11.0 to 3.11.17, 4.2.0 to 4.2.10, and 4.3.0 to 4.3.6 with specific forged traffic, can lead to SNS DoS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Stormshield Network Security (SNS) | >=3.7.0<3.7.30 | |
Stormshield Network Security (SNS) | >=3.11.0<3.11.18 | |
Stormshield Network Security (SNS) | >=4.2.0<4.2.11 | |
Stormshield Network Security (SNS) | >=4.3.0<4.3.7 | |
Stormshield Network Security | >=3.7.0<3.7.30 | |
Stormshield Network Security | >=3.11.0<3.11.18 | |
Stormshield Network Security | >=4.2.0<4.2.11 | |
Stormshield Network Security | >=4.3.0<4.3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-27812.
The severity of CVE-2022-27812 is high with a CVSS score of 7.5.
Stormshield Network Security versions 3.7.0 to 3.7.29, 3.11.0 to 3.11.17, 4.2.0 to 4.2.10, and 4.3.0 to 4.3.6 are affected by CVE-2022-27812.
CVE-2022-27812 can lead to a Denial of Service (DoS) by flooding the SNS firewall with forged traffic.
More information about CVE-2022-27812 can be found at the following advisory: https://advisories.stormshield.eu/2022-009/