Lucene search

K
cveSonicwallCVE-2022-2324
HistoryJul 29, 2022 - 9:15 p.m.

CVE-2022-2324

2022-07-2921:15:09
CWE-358
CWE-290
sonicwall
web.nvd.nist.gov
35
8
cve-2022-2324
vulnerability
sonicwall hosted email security
capture atp
bypass
nvd

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

31.1%

Improperly Implemented Security Check vulnerability in the SonicWall Hosted Email Security leads to bypass of Capture ATP security service in the appliance. This vulnerability impacts 10.0.17.7319 and earlier versions

Affected configurations

Nvd
Node
sonicwallemail_securityRange≀10.0.17.7319
VendorProductVersionCPE
sonicwallemail_security*cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "SonicWall Email Security",
    "vendor": "SonicWall",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.17.7319 and earlier"
      }
    ]
  }
]

Social References

More

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

31.1%

Related for CVE-2022-2324