SonicWall TZ500W

CPE Details

SonicWall TZ500W
-
2021-07-06
16h36 +00:00
2021-07-07
16h13 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:*

Informations

Vendor

sonicwall

Product

tz500w

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-47522 2023-04-15 00h00 +00:00 The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
7.5
High
CVE-2023-1101 2023-03-02 00h00 +00:00 SonicOS SSLVPN improper restriction of excessive MFA attempts vulnerability allows an authenticated attacker to use excessive MFA codes.
8.8
High
CVE-2022-22278 2022-04-27 14h25 +00:00 A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack
7.5
High
CVE-2022-22277 2022-04-27 14h25 +00:00 A vulnerability in SonicOS SNMP service resulting exposure of Wireless Access Point sensitive information in cleartext.
5.3
Medium
CVE-2022-22276 2022-04-27 14h25 +00:00 A vulnerability in SonicOS SNMP service resulting exposure of sensitive information to an unauthorized user.
5.3
Medium
CVE-2022-22275 2022-04-27 14h25 +00:00 Improper Restriction of TCP Communication Channel in HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake potentially resulting in Denial of Service (DoS) attack if a target host is vulnerable.
7.5
High
CVE-2021-20048 2022-01-07 02h00 +00:00 A Stack-based buffer overflow in the SonicOS SessionID HTTP response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 5, Gen 6 and Gen 7 firmware versions.
8.8
High
CVE-2021-20046 2022-01-07 02h00 +00:00 A Stack-based buffer overflow in the SonicOS HTTP Content-Length response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 5, Gen 6 and Gen 7 firmware versions.
8.8
High
CVE-2021-20031 2021-10-12 20h55 +00:00 A Host Header Redirection vulnerability in SonicOS potentially allows a remote attacker to redirect firewall management users to arbitrary web domains.
6.1
Medium
CVE-2021-20027 2021-06-14 20h30 +00:00 A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
7.5
High