7.8
CVE-2020-9363
- EPSS 0.06%
- Veröffentlicht 24.02.2020 16:15:13
- Zuletzt bearbeitet 21.11.2024 05:40:29
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. NOTE: the vendor feels that this does not apply to endpoint-protection products because the virus would be detected upon extraction.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sophos ≫ Cloud Optix Version < 2020-01-14
Sophos ≫ Endpoint Protection Version < 2020-01-14
Sophos ≫ Intercept X Endpoint Version < 2020-01-14
Sophos ≫ Intercept X For Server Version < 2020-01-14
Sophos ≫ Secure Web Gateway Version < 2020-01-14
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.197 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-436 Interpretation Conflict
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.