SECURITY ALERTS

A Vulnerability (CVE-2022-22274) Exist in SonicWall SonicOS Allow for Arbitrary Code Execution

DESCRIPTION:
SonicOS is an operating system using for SonicWall Firewall. A Stack-based buffer overflow vulnerability in the SonicOS via HTTP request allows a remote unauthenticated attacker to cause Denial of Service (DoS) or potentially results in code execution in the firewall.

 

AFFECTED RELEASES:
1. SonicWall FireWalls series appliances, which include TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700, NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSv 270, NSv 470, NSv 870, are vulnerable with the SonicOS version prior to 7.0.1-5050.
2. SonicWall NSsp Firewall series appliances, which include NSsp 15700, are vulnerable with the SonicOS version prior to 7.0.1-R579.
3. SonicWall NSv Firewalls series appliances, which include NSv 10, NSv 25, NSv 50, Nsv 100, NSv 200, NSv 300, NSv 400, NSv 800, NSv 1600, are vulnerable with the SonicOS version prior to 6.5.4.4-44v-21-1452.

 

SOLUTION:
1. Users and system administrators of affected products are advised to apply the security updates listed below:
(1) For SonicWall FireWalls, please update SonicOS to 7.0.1-5051 or above.
(2) For SonicWall NSsp Firewall, until the patches can be applied, administrators should limit SonicOS management access to trusted sources by modifying the existing SonicOS Management access rules. This will only allow management access from trusted source IP addresses.
(3) For SonicWall NSv FireWalls, please update SonicOS to 6.5.4.4-44v-21-1519 or above.


REFERENCE:
1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0003
2. https://nvd.nist.gov/vuln/detail/CVE-2022-22274
3. https://www.bleepingcomputer.com/news/security/critical-sonicwall-firewall-patch-not-released-for-all-devices/
 

Back To Top