CVE-2022-47522
https://notcve.org/view.php?id=CVE-2022-47522
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key. • https://papers.mathyvanhoef.com/usenix2023-wifi.pdf https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006 https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc https://www.wi-fi.org/discover-wi-fi/passpoint • CWE-290: Authentication Bypass by Spoofing •
CVE-2023-0656
https://notcve.org/view.php?id=CVE-2023-0656
A Stack-based buffer overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS), which could cause an impacted firewall to crash. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0004 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2023-1101
https://notcve.org/view.php?id=CVE-2023-1101
SonicOS SSLVPN improper restriction of excessive MFA attempts vulnerability allows an authenticated attacker to use excessive MFA codes. • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0005 • CWE-307: Improper Restriction of Excessive Authentication Attempts •
CVE-2022-22275
https://notcve.org/view.php?id=CVE-2022-22275
Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable. Una Restricción Inapropiada del Canal de Comunicación TCP en el tráfico de entrada HTTP/S de la WAN a la DMZ omitiendo la política de seguridad hasta el apretón de manos TCP, resultando potencialmente en un ataque de Denegación de Servicio (DoS) si el host de destino es vulnerable • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004 • CWE-400: Uncontrolled Resource Consumption •
CVE-2022-22274
https://notcve.org/view.php?id=CVE-2022-22274
A Stack-based buffer overflow vulnerability in the SonicOS via HTTP request allows a remote unauthenticated attacker to cause Denial of Service (DoS) or potentially results in code execution in the firewall. Una vulnerabilidad de desbordamiento de búfer en la región Stack de la memoria en SonicOS por medio de una petición HTTP permite a un atacante remoto no autenticado causar una denegación de servicio (DoS) o potencialmente resultando en una ejecución de código en el firewall • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0003 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •