CVE-2022-36324

high-risk
Published 2022-08-10

Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack.

Do I need to act?

~
1.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10 High
NETWORK / LOW complexity

Affected Products (20)

Scalance M-800 Firmware
Scalance W700 Ieee 802.11Ax Firmware
Scalance W700 Ieee 802.11N Firmware
Scalance W700 Ieee 802.11Ac Firmware
Scalance Xb-200 Firmware
Scalance Xb205-3 Firmware
Scalance Xb205-3Ld Firmware
Scalance Xb208 Firmware
Scalance Xb213-3 Firmware
Scalance Xb213-3Ld Firmware
Scalance Xb216 Firmware
Scalance Xc-200 Firmware
Scalance Xc206-2 Firmware
Scalance Xc206-2G Poe Firmware
Scalance Xc206-2G Poe Eec Firmware
Scalance Xc206-2Sfp Eec Firmware
Scalance Xc206-2Sfp G Firmware
Scalance Xc206-2Sfp G \(E\/Ip\) Firmware
Scalance Xc206-2Sfp G Eec Firmware

Affected Vendors

58
/ 100
high-risk
Severity 26/34 · High
Exploitability 3/34 · Minimal
Exposure 29/34 · Critical