Vulnerability Name:

CVE-2016-7786 (CCN-124703)

Assigned:2016-09-09
Published:2017-04-07
Updated:2018-04-19
Summary:Sophos Cyberoam UTM CR25iNG 10.6.3 MR-5 allows remote authenticated users to bypass intended access restrictions via direct object reference, as demonstrated by a request for Licenseinformation.jsp. This is fixed in 10.6.5.
CVSS v3 Severity:8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-264
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2016-7786

Source: XF
Type: UNKNOWN
sophos-cve20167786-priv-esc(124703)

Source: MISC
Type: Technical Description, Third Party Advisory
https://infosecninja.blogspot.in/2017/04/cve-2016-7786-sophos-cyberoam-utm.html

Source: CCN
Type: Information Security Aficionado Web site
CVE-2016-7786 - Sophos Cyberoam UTM - Privilege Escalation

Source: CCN
Type: Packet Storm Security [04-16-2018]
Sophos Cyberoam UTM CR25iNG 10.6.3 MR-5 Insecure Direct Object Reference

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [04-16-2018]

Source: EXPLOIT-DB
Type: UNKNOWN
44469

Source: CCN
Type: Sophos Web site
Sophos Cyberoam UTM CR25iNG

Vulnerable Configuration:Configuration 1:
  • cpe:/h:sophos:cyberoam_cr25ing_utm:-:*:*:*:*:*:*:*
  • AND
  • cpe:/o:sophos:cyberoam_cr25ing_utm_firmware:10.6.2:mr-5:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sophos cyberoam cr25ing utm -
    sophos cyberoam cr25ing utm firmware 10.6.2 mr-5