
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overflow vulnerability was identified in the SonicWall SSL-VPN NetExtender Windows Client (both 32 and 64 bit) in version 10.2.322 and earlier versions. This vulnerability, tracked as CVE-2022-22281, allows an attacker to potentially execute arbitrary code in the host Windows operating system (CVE Details).
The vulnerability is classified as a buffer overflow condition that exists in the SonicWall SSL-VPN NetExtender Windows Client. The issue affects both 32-bit and 64-bit versions of the client software up to and including version 10.2.322. When successfully exploited, this vulnerability could lead to arbitrary code execution in the context of the host Windows operating system (MITRE CVE).
The successful exploitation of this vulnerability could allow an attacker to execute arbitrary code in the host Windows operating system, potentially leading to complete system compromise. This poses a significant risk to the confidentiality, integrity, and availability of affected systems (CVE Details).
Users should upgrade their SonicWall SSL-VPN NetExtender Windows Client to a version newer than 10.2.322 to address this vulnerability. SonicWall has released patches to address this security issue (SonicWall Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."