PatchSiren cyber security CVE debrief
CVE-2022-40799 D-Link CVE debrief
CVE-2022-40799 is a D-Link DNR-322L vulnerability that CISA has placed in the Known Exploited Vulnerabilities catalog. For defenders, the main takeaway is operational: treat any exposed DNR-322L deployment as urgent to assess, mitigate, or retire. The source corpus does not provide a CVSS score or detailed exploit mechanics, so the safest response is to follow vendor guidance, apply any available mitigations, and replace or discontinue the product if mitigation is not available.
- Vendor
- D-Link
- Product
- DNR-322L
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2025-08-05
- Original CVE updated
- 2025-08-05
- Advisory published
- 2025-08-05
- Advisory updated
- 2025-08-05
Who should care
Organizations that operate or support D-Link DNR-322L devices, especially security teams, network administrators, and asset owners responsible for internet-facing or otherwise reachable appliances.
Technical summary
The official records identify the issue as a "Download of Code Without Integrity Check" vulnerability affecting the D-Link DNR-322L. CISA has marked it as known exploited. The supplied corpus does not include additional technical detail, a CVSS score, or confirmed attack prerequisites, so the only supported conclusion is that the product should be treated as high priority for defensive review and remediation.
Defensive priority
High. KEV inclusion means this vulnerability is already considered actively exploited by CISA, and the listed due date indicates remediation should be completed promptly.
Recommended defensive actions
- Inventory all D-Link DNR-322L devices and determine whether any are exposed to untrusted networks.
- Apply vendor instructions and mitigations as provided by D-Link.
- If no effective mitigation exists, discontinue use of the product and plan replacement.
- Follow CISA guidance, including BOD 22-01 where applicable to your environment.
- Prioritize remediation before the KEV due date of 2025-08-26.
- Confirm there are no external management interfaces or unnecessary services exposed on affected devices.
Evidence notes
This debrief is intentionally limited to the supplied corpus and official links. Supported facts: the issue is CVE-2022-40799; the product is D-Link DNR-322L; CISA lists it in the Known Exploited Vulnerabilities catalog; the KEV date added is 2025-08-05 and the due date is 2025-08-26; CISA recommends applying vendor mitigations, following BOD 22-01 guidance where relevant, or discontinuing use if mitigations are unavailable. No additional exploitation details or severity score were supplied.
Official resources
-
CVE-2022-40799 CVE record
CVE.org
-
CVE-2022-40799 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
-
Source item URL
cisa_kev
CISA added CVE-2022-40799 to the Known Exploited Vulnerabilities catalog on 2025-08-05 with a due date of 2025-08-26. The supplied corpus does not include a CVSS score or further exploitation detail, so this debrief focuses on verified, non