CVE-2022-22274

9.8 CRITICAL

📋 TL;DR

CVE-2022-22274 is a critical stack-based buffer overflow vulnerability in SonicOS firewalls that allows remote unauthenticated attackers to trigger denial of service or potentially execute arbitrary code via specially crafted HTTP requests. This affects organizations using SonicWall firewall appliances with vulnerable firmware versions. The vulnerability is remotely exploitable without authentication, making it particularly dangerous.

💻 Affected Systems

Products:
  • SonicWall NSv Series
  • SonicWall TZ Series
  • SonicWall NSa Series
  • SonicWall NSsp Series
Versions: SonicOS 7.0.1-5050 and earlier versions
Operating Systems: SonicOS
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations with HTTP management enabled are vulnerable. The vulnerability affects both physical and virtual firewall appliances.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete firewall compromise, lateral movement into protected networks, and persistent backdoor installation.

🟠

Likely Case

Denial of service causing firewall crashes and network disruption, potentially followed by limited code execution for information gathering.

🟢

If Mitigated

Firewall crashes requiring manual reboot, but no persistent compromise if proper network segmentation and monitoring are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a specially crafted HTTP request to the firewall management interface. Multiple proof-of-concept exploits are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SonicOS 7.0.1-5051 and later

Vendor Advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0003

Restart Required: Yes

Instructions:

1. Log into SonicWall firewall management interface. 2. Navigate to System > Settings > Firmware & Backups. 3. Download and install SonicOS 7.0.1-5051 or later. 4. Reboot the firewall after installation completes.

🔧 Temporary Workarounds

Disable HTTP Management

all

Disable HTTP-based management access to reduce attack surface

Navigate to System > Administration > Management > Management Interface Settings and disable HTTP

Restrict Management Access

all

Limit management interface access to trusted IP addresses only

Navigate to System > Administration > Management > Management Access and configure IP restrictions

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate firewall management interfaces
  • Deploy network-based intrusion prevention systems with signatures for this CVE

🔍 How to Verify

Check if Vulnerable:

Check SonicOS version via web interface: System > Status > System Status or CLI: show version

Check Version:

show version

Verify Fix Applied:

Verify SonicOS version is 7.0.1-5051 or later and check for successful patch installation in System Logs

📡 Detection & Monitoring

Log Indicators:

  • Multiple HTTP requests with abnormal length or patterns
  • Firewall crash/reboot events
  • Buffer overflow error messages in system logs

Network Indicators:

  • HTTP requests with unusually long headers or parameters to firewall management IP
  • Traffic patterns indicating exploitation attempts

SIEM Query:

source="sonicwall" AND (event_type="crash" OR message="*buffer*overflow*" OR message="*CVE-2022-22274*")

🔗 References

📤 Share & Export