Template IDs or paths
code/cves/2022/CVE-2022-42475.yaml
Environment
- OS: Linux and Windows
- Nuclei: v3.4.10
- Go: go1.25.1
Steps To Reproduce
- Run the template against a target protected by a firewall/IPS/WAF that intentionally drops / tears down the connection when it detects the probe (without confirming the CVE condition).
- Example command (redacted target):
nuclei -t code/cves/2022/CVE-2022-42475.yaml -u https://REDACTED -debug-resp
- Observe that the scan reports the target as vulnerable when the TCP/TLS connection is dropped.
Relevant dumped responses
A connection drop alone should not be treated as a positive indicator of vulnerability, because many security devices intentionally cut the connection for suspicious payloads.
Anything else?
This produces frequent false positives across targets that have active defenses (firewall/IPS/WAF) configured to terminate connections on suspicious requests.