INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h
Vulnerabilities

CVE-2022-40799

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
D-Link DNR-322L Download of Code Without Integrity Check Vulnerability — D-Link DNR-322L contains a download of code without integrity check vulnerability that could allow an authenticated attacker to
Published: Aug 5, 2025  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

D-Link DNR-322L Download of Code Without Integrity Check Vulnerability — D-Link DNR-322L contains a download of code without integrity check vulnerability that could allow an authenticated attacker to execute OS level commands on the device. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

🤖 AI Executive Summary

D-Link DNR-322L NAS devices contain a vulnerability allowing authenticated attackers to execute arbitrary OS commands due to missing code integrity verification during downloads. This critical flaw affects end-of-life products and poses significant risk to organizations still using these devices.

📄 Description (Arabic)

ثغرة D-Link DNR-322L تسمح للمستخدمين المصرح لهم بتحميل وتنفيذ أكواد ضارة دون التحقق من السلامة. المنتج منتهي الدعم ولا يتلقى تحديثات أمان، مما يجعله هدفاً سهلاً للمهاجمين. يجب على المنظمات السعودية التوقف الفوري عن استخدام هذه الأجهزة.

🤖 ملخص تنفيذي (AI)

جهاز D-Link DNR-322L يحتوي على ثغرة تسمح للمهاجمين المصرح لهم بتنفيذ أوامر نظام التشغيل التعسفية بسبب عدم التحقق من سلامة الكود. تؤثر هذه الثغرة الحرجة على المنتجات المنتهية الدعم وتشكل خطراً كبيراً على المنظمات.

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 06:17
🇸🇦 Saudi Arabia Impact Assessment
Saudi Relevance: high
🏢 Affected Saudi Sectors
banking government healthcare energy
🎯 MITRE ATT&CK Techniques
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
Immediately discontinue use of D-Link DNR-322L devices as they are end-of-life/end-of-service. If continued use is unavoidable, implement strict network segmentation, restrict administrative access, disable remote management features, monitor for suspicious activities, and plan urgent migration to supported NAS solutions with regular security updates.
🔧 خطوات المعالجة (العربية)
توقف فوراً عن استخدام أجهزة D-Link DNR-322L لأنها منتهية الدعم. إذا كان الاستخدام ضرورياً، طبق عزل الشبكة الصارم، قيد الوصول الإداري، عطل ميزات الإدارة البعيدة، راقب الأنشطة المريبة، وخطط للهجرة العاجلة إلى حلول NAS مدعومة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.8.1.1 A.8.2.1 A.8.3.1
🔵 SAMA CSF
ID.BE-1 PR.DS-6 PR.AC-1
🟡 ISO 27001:2022
A.12.2.1 A.12.6.1 A.14.2.1
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
D-Link:DNR-322L
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS40.34%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2025-08-26
Published 2025-08-05
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.