Filtered by vendor Sophos
Subscribe
Total
159 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-36806 | 1 Sophos | 1 Email Appliance | 2024-11-21 | N/A | 4.7 MEDIUM |
A reflected XSS vulnerability allows an open redirect when the victim clicks a malicious link to an error page on Sophos Email Appliance older than version 4.5.3.4. | |||||
CVE-2021-25273 | 1 Sophos | 1 Unified Threat Management | 2024-11-21 | 3.5 LOW | 4.8 MEDIUM |
Stored XSS can execute as administrator in quarantined email detail view in Sophos UTM before version 9.706. | |||||
CVE-2021-25271 | 1 Sophos | 1 Hitmanpro | 2024-11-21 | 3.6 LOW | 6.0 MEDIUM |
A local attacker could read or write arbitrary files with administrator privileges in HitmanPro before version Build 318. | |||||
CVE-2021-25270 | 1 Sophos | 1 Hitmanpro.alert | 2024-11-21 | 7.2 HIGH | 6.7 MEDIUM |
A local attacker could execute arbitrary code with administrator privileges in HitmanPro.Alert before version Build 901. | |||||
CVE-2021-25269 | 1 Sophos | 3 Exploit Prevention, Intercept X Endpoint, Intercept X For Server | 2024-11-21 | 2.1 LOW | 4.4 MEDIUM |
A local administrator could prevent the HMPA service from starting despite tamper protection using an unquoted service path vulnerability in the HMPA component of Sophos Intercept X Advanced and Sophos Intercept X Advanced for Server before version 2.0.23, as well as Sophos Exploit Prevention before version 3.8.3. | |||||
CVE-2021-25268 | 1 Sophos | 2 Firewall, Firewall Firmware | 2024-11-21 | 6.0 MEDIUM | 8.4 HIGH |
Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from MySophos admin to SFOS admin in Sophos Firewall older than version 19.0 GA. | |||||
CVE-2021-25267 | 1 Sophos | 2 Firewall, Firewall Firmware | 2024-11-21 | 8.5 HIGH | 6.8 MEDIUM |
Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 19.0 GA. | |||||
CVE-2021-25266 | 1 Sophos | 2 Authenticator, Intercept X | 2024-11-21 | 2.1 LOW | 3.9 LOW |
An insecure data storage vulnerability allows a physical attacker with root privileges to retrieve TOTP secret keys from unlocked phones in Sophos Authenticator for Android version 3.4 and older, and Intercept X for Mobile (Android) before version 9.7.3495. | |||||
CVE-2021-25265 | 2 Microsoft, Sophos | 2 Windows, Connect | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
A malicious website could execute code remotely in Sophos Connect Client before version 2.1. | |||||
CVE-2021-25264 | 1 Sophos | 2 Home, Intercept X | 2024-11-21 | 7.2 HIGH | 6.7 MEDIUM |
In multiple versions of Sophos Endpoint products for MacOS, a local attacker could execute arbitrary code with administrator privileges. | |||||
CVE-2020-9540 | 1 Sophos | 1 Hitmanpro.alert | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
Sophos HitmanPro.Alert before build 861 allows local elevation of privilege. | |||||
CVE-2020-9363 | 1 Sophos | 6 Cloud Optix, Endpoint Protection, Intercept X Endpoint and 3 more | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. NOTE: the vendor feels that this does not apply to endpoint-protection products because the virus would be detected upon extraction. | |||||
CVE-2020-17352 | 1 Sophos | 1 Xg Firewall Firmware | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Two OS command injection vulnerabilities in the User Portal of Sophos XG Firewall through 2020-08-05 potentially allow an authenticated attacker to remotely execute arbitrary code. | |||||
CVE-2020-15504 | 1 Sophos | 1 Xg Firewall Firmware | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A SQL injection vulnerability in the user and admin web interfaces of Sophos XG Firewall v18.0 MR1 and older potentially allows an attacker to run arbitrary code remotely. The fix is built into the re-release of XG Firewall v18 MR-1 (named MR-1-Build396) and the v17.5 MR13 release. All other versions >= 17.0 have received a hotfix. | |||||
CVE-2020-14980 | 1 Sophos | 1 Sophos Secure Email | 2024-11-21 | 4.3 MEDIUM | 5.9 MEDIUM |
The Sophos Secure Email application through 3.9.4 for Android has Missing SSL Certificate Validation. | |||||
CVE-2020-11503 | 1 Sophos | 2 Sfos, Xg Firewall | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A heap-based buffer overflow in the awarrensmtp component of Sophos XG Firewall v17.5 MR11 and older potentially allows an attacker to run arbitrary code remotely. | |||||
CVE-2020-10947 | 1 Sophos | 2 Anti-virus For Sophos Central, Anti-virus For Sophos Home | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Mac Endpoint for Sophos Central before 9.9.6 and Mac Endpoint for Sophos Home before 2.2.6 allow Privilege Escalation. | |||||
CVE-2019-17059 | 1 Sophos | 2 Cyberoam, Cyberoamos | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
A shell injection vulnerability on the Sophos Cyberoam firewall appliance with CyberoamOS before 10.6.6 MR-6 allows remote attackers to execute arbitrary commands via the Web Admin and SSL VPN consoles. | |||||
CVE-2018-9233 | 1 Sophos | 1 Endpoint Protection | 2024-11-21 | 2.1 LOW | 7.8 HIGH |
Sophos Endpoint Protection 10.7 uses an unsalted SHA-1 hash for password storage in %PROGRAMDATA%\Sophos\Sophos Anti-Virus\Config\machine.xml, which makes it easier for attackers to determine a cleartext password, and subsequently choose unsafe malware settings, via rainbow tables or other approaches. | |||||
CVE-2018-6857 | 1 Sophos | 3 Safeguard Easy Device Encryption Client, Safeguard Enterprise Client, Safeguard Lan Crypt Client | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x802022E0. By crafting an input buffer we can control the execution path to the point where the constant 0x12 will be written to a user-controlled address. We can take advantage of this condition to modify the SEP_TOKEN_PRIVILEGES structure of the Token object belonging to the exploit process and grant SE_DEBUG_NAME privilege. This allows the exploit process to interact with higher privileged processes running as SYSTEM and execute code in their security context. |