Vulnerability Name: | CVE-2018-4863 (CCN-141220) | ||||||||||||
Assigned: | 2018-04-04 | ||||||||||||
Published: | 2018-04-04 | ||||||||||||
Updated: | 2018-05-18 | ||||||||||||
Summary: | Sophos Endpoint Protection 10.7 allows local users to bypass an intended tamper protection mechanism by deleting the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Sophos Endpoint Defense\ registry key. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) 5.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C)
5.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-254 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-4863 Source: MISC Type: Exploit, Third Party Advisory http://hyp3rlinx.altervista.org/advisories/SOPHOS-ENDPOINT-PROTECTION-v10.7-TAMPER-PROTECTION-BYPASS-CVE-2018-4863.txt Source: CCN Type: Full-Disclosure Mailing List, Wed, 4 Apr 2018 00:04:53 -0400 CVE-2018-4863 Sophos Endpoint Protection v10.7 / Tamper Protection Bypass Source: FULLDISC Type: Exploit, Mailing List, Third Party Advisory 20180403 CVE-2018-4863 Sophos Endpoint Protection v10.7 / Tamper Protection Bypass Source: XF Type: UNKNOWN sophos-cve20184863-sec-bypass(141220) Source: CCN Type: Packet Storm Security [04-04-2018] Sophos Endpoint Protection 10.7 Tamper Protection Bypass Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [04-06-2018] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 44410 Source: CCN Type: Sophos Web site Endpoint Protection | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |