// For flags

CVE-2022-22279

 

Severity Score

4.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A post-authentication arbitrary file read vulnerability impacting end-of-life Secure Remote Access (SRA) products and older firmware versions of Secure Mobile Access (SMA) 100 series products, specifically the SRA appliances running all 8.x, 9.0.0.5-19sv and earlier versions and Secure Mobile Access (SMA) 100 series products running older firmware 9.0.0.9-26sv and earlier versions

Una vulnerabilidad de lectura arbitraria de archivos después de la autenticación que afecta a los productos Secure Remote Access (SRA) al final de su vida útil y a las versiones de firmware más antiguas de los productos de la serie 100 de Secure Mobile Access (SMA), concretamente a los dispositivos SRA que ejecutan todas las versiones 8.x, 9.0.0.5-19sv y anteriores y a los productos de la serie 100 de Secure Mobile Access (SMA) que ejecutan el firmware más antiguo 9.0.0.9-26sv y versiones anteriores

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-12-29 CVE Reserved
  • 2022-04-13 CVE Published
  • 2023-11-04 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • CWE-23: Relative Path Traversal
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sonicwall
Search vendor "Sonicwall"
Sra 1200 Firmware
Search vendor "Sonicwall" for product "Sra 1200 Firmware"
<= 9.0.0.5-19sv
Search vendor "Sonicwall" for product "Sra 1200 Firmware" and version " <= 9.0.0.5-19sv"
-
Affected
in Sonicwall
Search vendor "Sonicwall"
Sra 1200
Search vendor "Sonicwall" for product "Sra 1200"
--
Safe
Sonicwall
Search vendor "Sonicwall"
Sra 4200 Firmware
Search vendor "Sonicwall" for product "Sra 4200 Firmware"
<= 9.0.0.5-19sv
Search vendor "Sonicwall" for product "Sra 4200 Firmware" and version " <= 9.0.0.5-19sv"
-
Affected
in Sonicwall
Search vendor "Sonicwall"
Sra 4200
Search vendor "Sonicwall" for product "Sra 4200"
--
Safe
Sonicwall
Search vendor "Sonicwall"
Sma 210 Firmware
Search vendor "Sonicwall" for product "Sma 210 Firmware"
< 9.0.0.10-28sv
Search vendor "Sonicwall" for product "Sma 210 Firmware" and version " < 9.0.0.10-28sv"
-
Affected
in Sonicwall
Search vendor "Sonicwall"
Sma 210
Search vendor "Sonicwall" for product "Sma 210"
--
Safe
Sonicwall
Search vendor "Sonicwall"
Sma 410 Firmware
Search vendor "Sonicwall" for product "Sma 410 Firmware"
< 9.0.0.10-28sv
Search vendor "Sonicwall" for product "Sma 410 Firmware" and version " < 9.0.0.10-28sv"
-
Affected
in Sonicwall
Search vendor "Sonicwall"
Sma 410
Search vendor "Sonicwall" for product "Sma 410"
--
Safe
Sonicwall
Search vendor "Sonicwall"
Sma 500v Firmware
Search vendor "Sonicwall" for product "Sma 500v Firmware"
< 9.0.0.10-28sv
Search vendor "Sonicwall" for product "Sma 500v Firmware" and version " < 9.0.0.10-28sv"
-
Affected
in Sonicwall
Search vendor "Sonicwall"
Sma 500v
Search vendor "Sonicwall" for product "Sma 500v"
--
Safe
* End Of Life in some or all products. Do not expect updates.