CVE-2022-22281
Published on: Not Yet Published
Last Modified on: 05/13/2022 09:07:00 PM UTC
Certain versions of SonicWall NetExtender Windows 32 And 64 Bit Client from SonicWall contain the following vulnerability:
A buffer overflow vulnerability in the SonicWall SSL-VPN NetExtender Windows Client (32 and 64 bit) in 10.2.322 and earlier versions, allows an attacker to potentially execute arbitrary code in the host windows operating system.
- CVE-2022-22281 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
SonicWall - SonicWall NetExtender Windows (32 and 64 bit) Client version 10.2.322 and earlier versions
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Security Advisory | psirt.global.sonicwall.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
SonicWall | SonicWall_NetExtender_Windows_32_and_64_bit_Client | 10.2.322 and earlier versions |
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-22281 : A buffer overflow vulnerability in the SonicWall SSL-VPN NetExtender #Windows Client 32 and 64 bi… twitter.com/i/web/status/1… | 2022-05-13 19:47:46 |
![]() |
Potentially Critical CVE Detected! CVE-2022-22281 A buffer overflow vulnerability in the SonicWall SSL-VPN NetExten… twitter.com/i/web/status/1… | 2022-05-13 20:56:02 |
![]() |
CVE-2022-22281 | 2022-05-13 20:38:18 |