{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T18:24:56.797","vulnerabilities":[{"cve":{"id":"CVE-2022-22279","sourceIdentifier":"PSIRT@sonicwall.com","published":"2022-04-13T06:15:07.177","lastModified":"2024-11-21T06:46:33.013","vulnStatus":"Modified","cveTags":[{"sourceIdentifier":"PSIRT@sonicwall.com","tags":["unsupported-when-assigned"]}],"descriptions":[{"lang":"en","value":"A post-authentication arbitrary file read vulnerability impacting end-of-life Secure Remote Access (SRA) products and older firmware versions of Secure Mobile Access (SMA) 100 series products, specifically the SRA appliances running all 8.x, 9.0.0.5-19sv and earlier versions and Secure Mobile Access (SMA) 100 series products running older firmware 9.0.0.9-26sv and earlier versions"},{"lang":"es","value":"** NO SOPORTADO CUANDO SE ASIGNÓ ** Una vulnerabilidad de lectura arbitraria de archivos después de la autenticación que afecta a los productos Secure Remote Access (SRA) al final de su vida útil y a las versiones de firmware más antiguas de los productos de la serie 100 de Secure Mobile Access (SMA), concretamente a los dispositivos SRA que ejecutan todas las versiones 8.x, 9.0.0.5-19sv y anteriores y a los productos de la serie 100 de Secure Mobile Access (SMA) que ejecutan el firmware más antiguo 9.0.0.9-26sv y versiones anteriores"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"PSIRT@sonicwall.com","type":"Secondary","description":[{"lang":"en","value":"CWE-23"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sonicwall:sra_1200_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"9.0.0.5-19sv","matchCriteriaId":"9B1F8903-DB6B-4795-A97E-F7B4916DCBC7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sonicwall:sra_1200:-:*:*:*:*:*:*:*","matchCriteriaId":"57A11F88-DDC9-4C59-A985-DA831BEF78D4"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sonicwall:sra_4200_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"9.0.0.5-19sv","matchCriteriaId":"9A85046F-061A-4EB8-AFA5-80B19E0216E0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sonicwall:sra_4200:-:*:*:*:*:*:*:*","matchCriteriaId":"7E0D22FF-44D8-4D95-AC53-4C427CAD7CF1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.0.0.10-28sv","matchCriteriaId":"65C5F0B0-52B8-4B4D-BAC4-621AC436E277"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*","matchCriteriaId":"51587338-4A5F-41FC-9497-743F061947C2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.0.0.10-28sv","matchCriteriaId":"6EAE0CEC-B7B9-463B-8B3C-768087516C3E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*","matchCriteriaId":"9DFB8FBC-FFA4-4526-B306-D5692A43DC9E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sonicwall:sma_500v_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.0.0.10-28sv","matchCriteriaId":"C7FD613A-FB00-43FE-9A00-97172FF85EA6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:*","matchCriteriaId":"A6AD8A33-7CE4-4C66-9E23-F0C9C9638770"}]}]}],"references":[{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0006","source":"PSIRT@sonicwall.com","tags":["Vendor Advisory"]},{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0006","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}