Vulnerabilites related to sophos - firewall
Vulnerability from fkie_nvd
Published
2022-05-05 18:15
Modified
2024-11-21 05:54
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
8.4 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Summary
Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 19.0 GA.
References
▼ | URL | Tags | |
---|---|---|---|
security-alert@sophos.com | https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0 | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sophos | firewall_firmware | * | |
sophos | firewall | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:firewall_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE8FAED-A79E-470F-B3DE-51F326E80353", "versionEndExcluding": "19.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:firewall:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F728103-324C-4F34-9EE6-6E922018A2EB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 19.0 GA." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de tipo XSS en Webadmin permiten una escalada de privilegios de admin a super-admin en Sophos Firewall versiones anteriores a 19.0 GA" } ], "id": "CVE-2021-25267", "lastModified": "2024-11-21T05:54:38.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "security-alert@sophos.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-05T18:15:09.367", "references": [ { "source": "security-alert@sophos.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0" } ], "sourceIdentifier": "security-alert@sophos.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-18 00:15
Modified
2024-11-21 08:41
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
A password disclosure vulnerability in the Secure PDF eXchange (SPX) feature allows attackers with full email access to decrypt PDFs in Sophos Firewall version 19.5 MR3 (19.5.3) and older, if the password type is set to “Specified by sender”.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:firewall:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0D1E636-2017-4F99-A244-E229B22928A8", "versionEndIncluding": "19.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A password disclosure vulnerability in the Secure PDF eXchange (SPX) feature allows attackers with full email access to decrypt PDFs in Sophos Firewall version 19.5 MR3 (19.5.3) and older, if the password type is set to \u201cSpecified by sender\u201d." }, { "lang": "es", "value": "Una vulnerabilidad de divulgaci\u00f3n de contrase\u00f1a en la funci\u00f3n Secure PDF eXchange (SPX) permite a atacantes con acceso completo al correo electr\u00f3nico descifrar archivos PDF en Sophos Firewall versi\u00f3n 19.5 MR3 (19.5.3) y anteriores, si el tipo de contrase\u00f1a est\u00e1 configurado en \"Especificado por el remitente\"." } ], "id": "CVE-2023-5552", "lastModified": "2024-11-21T08:41:59.903", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.0, "source": "security-alert@sophos.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-18T00:15:10.257", "references": [ { "source": "security-alert@sophos.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20231017-spx-password" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20231017-spx-password" } ], "sourceIdentifier": "security-alert@sophos.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-alert@sophos.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-07 18:15
Modified
2024-11-21 06:41
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple SQLi vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 18.5 MR4 and version 19.0 MR1.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:firewall:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A61590C-AF2E-4B0D-AD57-3926DF2F9A93", "versionEndExcluding": "18.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:firewall:18.5:-:*:*:*:*:*:*", "matchCriteriaId": "95C01CDA-1FB6-415C-848A-864C43826456", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:firewall:18.5:mr1:*:*:*:*:*:*", "matchCriteriaId": "96E12DC0-C205-4C5D-B783-86B3B3C5FDA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:firewall:18.5:mr1-1:*:*:*:*:*:*", "matchCriteriaId": "7341AD9B-2544-4ED9-8A66-BD87EFF5B910", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:firewall:18.5:mr2:*:*:*:*:*:*", "matchCriteriaId": "407EE4F0-CA08-4277-BA21-12503B98FB96", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:firewall:18.5:mr3:*:*:*:*:*:*", "matchCriteriaId": "1FD3480B-4D2A-4BE3-BFB6-4089094CDD62", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:firewall:19.0:-:*:*:*:*:*:*", "matchCriteriaId": "0894CD70-C3C3-4900-8B5A-7B33F753A691", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQLi vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 18.5 MR4 and version 19.0 MR1." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades SQLi en Webadmin permiten una escalada de privilegios de administrador a superadministrador en Sophos Firewall versiones anteriores a versi\u00f3n 18.5 MR4 y versi\u00f3n 19.0 MR1" } ], "id": "CVE-2022-1807", "lastModified": "2024-11-21T06:41:30.647", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security-alert@sophos.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-07T18:15:08.647", "references": [ { "source": "security-alert@sophos.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-18-5-4" }, { "source": "security-alert@sophos.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-19-0-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-18-5-4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-19-0-1" } ], "sourceIdentifier": "security-alert@sophos.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-05 18:15
Modified
2024-11-21 05:54
Severity ?
8.4 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
8.4 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
8.4 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Summary
Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from MySophos admin to SFOS admin in Sophos Firewall older than version 19.0 GA.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sophos | firewall_firmware | * | |
sophos | firewall | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:firewall_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE8FAED-A79E-470F-B3DE-51F326E80353", "versionEndExcluding": "19.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:firewall:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F728103-324C-4F34-9EE6-6E922018A2EB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from MySophos admin to SFOS admin in Sophos Firewall older than version 19.0 GA." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de tipo XSS en Webadmin permiten la escalada de privilegios de MySophos admin a SFOS admin en Sophos Firewall versiones anteriores a 19.0 GA" } ], "id": "CVE-2021-25268", "lastModified": "2024-11-21T05:54:39.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 6.0, "source": "security-alert@sophos.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-05T18:15:09.427", "references": [ { "source": "security-alert@sophos.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0" } ], "sourceIdentifier": "security-alert@sophos.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-23 13:15
Modified
2025-01-28 22:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older.
References
{ "cisaActionDue": "2022-10-14", "cisaExploitAdd": "2022-09-23", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Sophos Firewall Code Injection Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:firewall:*:*:*:*:*:*:*:*", "matchCriteriaId": "666EACE3-6C5C-4CB8-A174-42010E17C539", "versionEndIncluding": "19.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en User Portal and Webadmin permite a un atacante remoto ejecutar c\u00f3digo en Sophos Firewall versiones v19.0 MR1 y anteriores." } ], "id": "CVE-2022-3236", "lastModified": "2025-01-28T22:15:10.673", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "security-alert@sophos.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-09-23T13:15:10.327", "references": [ { "source": "security-alert@sophos.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce" } ], "sourceIdentifier": "security-alert@sophos.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
cve-2023-5552
Vulnerability from cvelistv5
Published
2023-10-17 23:29
Modified
2024-09-13 16:21
Severity ?
EPSS score ?
Summary
A password disclosure vulnerability in the Secure PDF eXchange (SPX) feature allows attackers with full email access to decrypt PDFs in Sophos Firewall version 19.5 MR3 (19.5.3) and older, if the password type is set to “Specified by sender”.
References
▼ | URL | Tags |
---|---|---|
https://www.sophos.com/en-us/security-advisories/sophos-sa-20231017-spx-password | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Sophos | Sophos Firewall |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:59:44.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20231017-spx-password" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5552", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-13T16:20:59.543456Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T16:21:10.363Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Sophos Firewall", "vendor": "Sophos", "versions": [ { "status": "unaffected", "version": "19.5.4" }, { "status": "unaffected", "version": "20.0.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "IT f\u00fcr Caritas eG" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A password disclosure vulnerability in the Secure PDF eXchange (SPX) feature allows attackers with full email access to decrypt PDFs in Sophos Firewall version 19.5 MR3 (19.5.3) and older, if the password type is set to \u201cSpecified by sender\u201d." } ], "value": "A password disclosure vulnerability in the Secure PDF eXchange (SPX) feature allows attackers with full email access to decrypt PDFs in Sophos Firewall version 19.5 MR3 (19.5.3) and older, if the password type is set to \u201cSpecified by sender\u201d." } ], "impacts": [ { "capecId": "CAPEC-117", "descriptions": [ { "lang": "en", "value": "CAPEC-117 Interception" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-17T23:29:12.601Z", "orgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "shortName": "Sophos" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20231017-spx-password" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "assignerShortName": "Sophos", "cveId": "CVE-2023-5552", "datePublished": "2023-10-17T23:29:12.601Z", "dateReserved": "2023-10-12T05:55:23.384Z", "dateUpdated": "2024-09-13T16:21:10.363Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25268
Vulnerability from cvelistv5
Published
2022-05-05 18:05
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from MySophos admin to SFOS admin in Sophos Firewall older than version 19.0 GA.
References
▼ | URL | Tags |
---|---|---|
https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Sophos | Sophos Firewall |
Version: unspecified < 19.0 GA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.069Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sophos Firewall", "vendor": "Sophos", "versions": [ { "lessThan": "19.0 GA", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Gaetano Sapia" } ], "descriptions": [ { "lang": "en", "value": "Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from MySophos admin to SFOS admin in Sophos Firewall older than version 19.0 GA." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T18:05:13", "orgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "shortName": "Sophos" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@sophos.com", "ID": "CVE-2021-25268", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sophos Firewall", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "19.0 GA" } ] } } ] }, "vendor_name": "Sophos" } ] } }, "credit": [ { "lang": "eng", "value": "Gaetano Sapia" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from MySophos admin to SFOS admin in Sophos Firewall older than version 19.0 GA." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0", "refsource": "CONFIRM", "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0" } ] } } } }, "cveMetadata": { "assignerOrgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "assignerShortName": "Sophos", "cveId": "CVE-2021-25268", "datePublished": "2022-05-05T18:05:13", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.069Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1807
Vulnerability from cvelistv5
Published
2022-09-07 18:00
Modified
2024-08-03 00:16
Severity ?
EPSS score ?
Summary
Multiple SQLi vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 18.5 MR4 and version 19.0 MR1.
References
▼ | URL | Tags |
---|---|---|
https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-18-5-4 | x_refsource_CONFIRM | |
https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-19-0-1 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Sophos | Sophos Firewall |
Version: unspecified < 18.5 MR4 Version: unspecified < 19.0 MR1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:16:59.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-18-5-4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-19-0-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sophos Firewall", "vendor": "Sophos", "versions": [ { "lessThan": "18.5 MR4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "19.0 MR1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple SQLi vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 18.5 MR4 and version 19.0 MR1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-07T18:00:14", "orgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "shortName": "Sophos" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-18-5-4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-19-0-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@sophos.com", "ID": "CVE-2022-1807", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sophos Firewall", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "18.5 MR4" }, { "version_affected": "\u003c", "version_value": "19.0 MR1" } ] } } ] }, "vendor_name": "Sophos" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQLi vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 18.5 MR4 and version 19.0 MR1." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-18-5-4", "refsource": "CONFIRM", "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-18-5-4" }, { "name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-19-0-1", "refsource": "CONFIRM", "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-19-0-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "assignerShortName": "Sophos", "cveId": "CVE-2022-1807", "datePublished": "2022-09-07T18:00:14", "dateReserved": "2022-05-20T00:00:00", "dateUpdated": "2024-08-03T00:16:59.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3236
Vulnerability from cvelistv5
Published
2022-09-23 12:50
Modified
2025-01-28 21:48
Severity ?
EPSS score ?
Summary
A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older.
References
▼ | URL | Tags |
---|---|---|
https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Sophos | Sophos Firewall |
Version: unspecified < Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.526Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-3236", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T21:40:50.761466Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-09-23", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-3236" }, "type": "kev" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T21:48:56.157Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sophos Firewall", "vendor": "Sophos", "versions": [ { "lessThanOrEqual": "18.5 MR4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "19.0 MR1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-23T12:50:13.000Z", "orgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "shortName": "Sophos" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@sophos.com", "ID": "CVE-2022-3236", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sophos Firewall", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "18.5 MR4" }, { "version_affected": "\u003c=", "version_value": "19.0 MR1" } ] } } ] }, "vendor_name": "Sophos" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce", "refsource": "CONFIRM", "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce" } ] } } } }, "cveMetadata": { "assignerOrgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "assignerShortName": "Sophos", "cveId": "CVE-2022-3236", "datePublished": "2022-09-23T12:50:13.000Z", "dateReserved": "2022-09-17T00:00:00.000Z", "dateUpdated": "2025-01-28T21:48:56.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25267
Vulnerability from cvelistv5
Published
2022-05-05 18:05
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 19.0 GA.
References
▼ | URL | Tags |
---|---|---|
https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Sophos | Sophos Firewall |
Version: unspecified < 19.0 GA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.100Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sophos Firewall", "vendor": "Sophos", "versions": [ { "lessThan": "19.0 GA", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Gaetano Sapia" } ], "descriptions": [ { "lang": "en", "value": "Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 19.0 GA." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T18:05:11", "orgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "shortName": "Sophos" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@sophos.com", "ID": "CVE-2021-25267", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sophos Firewall", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "19.0 GA" } ] } } ] }, "vendor_name": "Sophos" } ] } }, "credit": [ { "lang": "eng", "value": "Gaetano Sapia" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 19.0 GA." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0", "refsource": "CONFIRM", "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0" } ] } } } }, "cveMetadata": { "assignerOrgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "assignerShortName": "Sophos", "cveId": "CVE-2021-25267", "datePublished": "2022-05-05T18:05:12", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.100Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202209-1931
Vulnerability from variot
A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1931", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "firewall", "scope": "lte", "trust": 1.0, "vendor": "sophos", "version": "19.0.1" }, { "model": "firewall", "scope": "lte", "trust": 0.8, "vendor": "\u30bd\u30d5\u30a9\u30b9", "version": "19.0.1 and earlier" }, { "model": "firewall", "scope": "eq", "trust": 0.8, "vendor": "\u30bd\u30d5\u30a9\u30b9", "version": null }, { "model": "firewall", "scope": null, "trust": 0.8, "vendor": "\u30bd\u30d5\u30a9\u30b9", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017940" }, { "db": "NVD", "id": "CVE-2022-3236" } ] }, "cve": "CVE-2022-3236", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-3236", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-3236", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-3236", "trust": 1.0, "value": "CRITICAL" }, { "author": "security-alert@sophos.com", "id": "CVE-2022-3236", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-3236", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202209-2368", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017940" }, { "db": "CNNVD", "id": "CNNVD-202209-2368" }, { "db": "NVD", "id": "CVE-2022-3236" }, { "db": "NVD", "id": "CVE-2022-3236" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-3236" }, { "db": "JVNDB", "id": "JVNDB-2022-017940" }, { "db": "VULHUB", "id": "VHN-430846" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-3236", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-017940", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-2368", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430846", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430846" }, { "db": "JVNDB", "id": "JVNDB-2022-017940" }, { "db": "CNNVD", "id": "CNNVD-202209-2368" }, { "db": "NVD", "id": "CVE-2022-3236" } ] }, "id": "VAR-202209-1931", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430846" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:42:24.644000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Sophos Firewall Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=209421" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-2368" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.0 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-74", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430846" }, { "db": "JVNDB", "id": "JVNDB-2022-017940" }, { "db": "NVD", "id": "CVE-2022-3236" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-3236" }, { "trust": 0.8, "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-3236/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/sophos-firewall-code-execution-via-user-portal-webadmin-39358" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430846" }, { "db": "JVNDB", "id": "JVNDB-2022-017940" }, { "db": "CNNVD", "id": "CNNVD-202209-2368" }, { "db": "NVD", "id": "CVE-2022-3236" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430846" }, { "db": "JVNDB", "id": "JVNDB-2022-017940" }, { "db": "CNNVD", "id": "CNNVD-202209-2368" }, { "db": "NVD", "id": "CVE-2022-3236" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-23T00:00:00", "db": "VULHUB", "id": "VHN-430846" }, { "date": "2023-10-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017940" }, { "date": "2022-09-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-2368" }, { "date": "2022-09-23T13:15:10.327000", "db": "NVD", "id": "CVE-2022-3236" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-28T00:00:00", "db": "VULHUB", "id": "VHN-430846" }, { "date": "2023-10-17T08:05:00", "db": "JVNDB", "id": "JVNDB-2022-017940" }, { "date": "2022-09-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-2368" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2022-3236" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-2368" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "of Sophos \u00a0firewall\u00a0 Code injection vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017940" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-2368" } ], "trust": 0.6 } }
var-202209-0443
Vulnerability from variot
Multiple SQLi vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 18.5 MR4 and version 19.0 MR1. of Sophos firewall for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Sophos Firewall is a firewall of British Sophos company. Attackers can use this vulnerability to upgrade the privilege from administrator to super administrator
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0443", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "firewall", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "19.0" }, { "model": "firewall", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "18.5" }, { "model": "firewall", "scope": "lt", "trust": 1.0, "vendor": "sophos", "version": "18.5" }, { "model": "firewall", "scope": null, "trust": 0.8, "vendor": "\u30bd\u30d5\u30a9\u30b9", "version": null }, { "model": "firewall", "scope": "eq", "trust": 0.8, "vendor": "\u30bd\u30d5\u30a9\u30b9", "version": "19.0" }, { "model": "firewall", "scope": "eq", "trust": 0.8, "vendor": "\u30bd\u30d5\u30a9\u30b9", "version": null }, { "model": "firewall", "scope": "eq", "trust": 0.8, "vendor": "\u30bd\u30d5\u30a9\u30b9", "version": "18.5" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016526" }, { "db": "NVD", "id": "CVE-2022-1807" } ] }, "cve": "CVE-2022-1807", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2022-1807", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-1807", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-1807", "trust": 1.0, "value": "HIGH" }, { "author": "security-alert@sophos.com", "id": "CVE-2022-1807", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-1807", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-456", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016526" }, { "db": "CNNVD", "id": "CNNVD-202209-456" }, { "db": "NVD", "id": "CVE-2022-1807" }, { "db": "NVD", "id": "CVE-2022-1807" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple SQLi vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 18.5 MR4 and version 19.0 MR1. of Sophos firewall for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Sophos Firewall is a firewall of British Sophos company. Attackers can use this vulnerability to upgrade the privilege from administrator to super administrator", "sources": [ { "db": "NVD", "id": "CVE-2022-1807" }, { "db": "JVNDB", "id": "JVNDB-2022-016526" }, { "db": "VULHUB", "id": "VHN-422956" }, { "db": "VULMON", "id": "CVE-2022-1807" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-1807", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-016526", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-456", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-422956", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-1807", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-422956" }, { "db": "VULMON", "id": "CVE-2022-1807" }, { "db": "JVNDB", "id": "JVNDB-2022-016526" }, { "db": "CNNVD", "id": "CNNVD-202209-456" }, { "db": "NVD", "id": "CVE-2022-1807" } ] }, "id": "VAR-202209-0443", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-422956" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:03.191000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Sophos Firewall SQL Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=207259" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-456" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-89", "trust": 1.1 }, { "problemtype": "SQL injection (CWE-89) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-422956" }, { "db": "JVNDB", "id": "JVNDB-2022-016526" }, { "db": "NVD", "id": "CVE-2022-1807" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-18-5-4" }, { "trust": 2.6, "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-19-0-1" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1807" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-1807/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/sophos-firewall-privilege-escalation-via-webadmin-39214" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-422956" }, { "db": "VULMON", "id": "CVE-2022-1807" }, { "db": "JVNDB", "id": "JVNDB-2022-016526" }, { "db": "CNNVD", "id": "CNNVD-202209-456" }, { "db": "NVD", "id": "CVE-2022-1807" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-422956" }, { "db": "VULMON", "id": "CVE-2022-1807" }, { "db": "JVNDB", "id": "JVNDB-2022-016526" }, { "db": "CNNVD", "id": "CNNVD-202209-456" }, { "db": "NVD", "id": "CVE-2022-1807" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-07T00:00:00", "db": "VULHUB", "id": "VHN-422956" }, { "date": "2022-09-07T00:00:00", "db": "VULMON", "id": "CVE-2022-1807" }, { "date": "2023-10-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016526" }, { "date": "2022-09-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-456" }, { "date": "2022-09-07T18:15:08.647000", "db": "NVD", "id": "CVE-2022-1807" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-12T00:00:00", "db": "VULHUB", "id": "VHN-422956" }, { "date": "2022-09-08T00:00:00", "db": "VULMON", "id": "CVE-2022-1807" }, { "date": "2023-10-04T09:00:00", "db": "JVNDB", "id": "JVNDB-2022-016526" }, { "date": "2022-09-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-456" }, { "date": "2022-09-12T18:38:29.497000", "db": "NVD", "id": "CVE-2022-1807" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-456" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "of Sophos \u00a0firewall\u00a0 In \u00a0SQL\u00a0 Injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016526" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SQL injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-456" } ], "trust": 0.6 } }