CVE-2022-22278

CVSS V2 Medium 5 CVSS V3 High 7.5
Description
A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack
Overview
  • CVE ID
  • CVE-2022-22278
  • Assigner
  • PSIRT@sonicwall.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-04-27T17:15:07
  • Last Modified Date
  • 2022-05-06T17:56:55
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:sonicwall:tz300p_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz300w_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz350_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz350w_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nssp_10700_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nssp_11700_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nssp_12400_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nssp_12800_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nssp_13700_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nssp_15700_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz370_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz370w_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz400_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_10_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_10:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_100_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_100:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_1600_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_1600:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_200_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_200:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_25_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_25:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_270_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_300_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_300:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_400_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_400:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_470_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_50_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_50:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_800_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_800:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsv_870_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1.0
cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz400w_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz470_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz470w_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz500_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_2650_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_2700_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_3650_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_3700_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_4650_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_4700_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_5650_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_5700_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_6650_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_6700_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_9250_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_9450_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:nsa_9650_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz500w_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz570_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz570p_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz570w_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz600_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz600p_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sonicwall:tz670_firmware:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-08 06:18:55 Added to TrackCVE