mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-12 02:04:49 +00:00
102 lines
3.1 KiB
JSON
102 lines
3.1 KiB
JSON
{
|
|
"id": "CVE-2022-27812",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-08-24T12:15:08.433",
|
|
"lastModified": "2023-03-03T18:22:03.387",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Flooding SNS firewall versions 3.7.0 to 3.7.29, 3.11.0 to 3.11.17, 4.2.0 to 4.2.10, and 4.3.0 to 4.3.6 with specific forged traffic, can lead to SNS DoS."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Inundar las versiones 3.7.0 a 3.7.29, 3.11.0 a 3.11.17, 4.2.0 a 4.2.10, y 4.3.0 a 4.3.6 del cortafuegos SNS con tr\u00e1fico forjado espec\u00edfico, puede conducir a un DoS SNS"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-400"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "3.7.0",
|
|
"versionEndExcluding": "3.7.30",
|
|
"matchCriteriaId": "8C50DD87-764D-456F-A788-B89B8B1CB058"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "3.11.0",
|
|
"versionEndExcluding": "3.11.18",
|
|
"matchCriteriaId": "3CC26C37-109C-4260-8F7C-DD63D4CEDD1C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "4.2.0",
|
|
"versionEndExcluding": "4.2.11",
|
|
"matchCriteriaId": "AA603F8D-C46E-423C-8A86-88F55CE40D35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:stormshield:network_security:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "4.3.0",
|
|
"versionEndExcluding": "4.3.7",
|
|
"matchCriteriaId": "D7AC7E7E-B95A-4CF7-A879-B9E08F7A20AB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://advisories.stormshield.eu/2022-009/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |