Vulnerability Name: | CVE-2020-9363 (CCN-176771) | ||||||||||||
Assigned: | 2020-02-24 | ||||||||||||
Published: | 2020-02-24 | ||||||||||||
Updated: | 2022-04-18 | ||||||||||||
Summary: | The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. Note: the vendor feels that this does not apply to endpoint-protection products because the virus would be detected upon extraction. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-436 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-9363 Source: CCN Type: Zoller Blog, 02/24/2020 [TZO-21-2020] - Sophos Generic Archive Bypass (ZIP) Source: MISC Type: Third Party Advisory https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.html Source: MISC Type: Vendor Advisory https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9363 Source: XF Type: UNKNOWN sophos-cve20209363-sec-bypass(176771) Source: CCN Type: Sophos Web site Sophos Antiirus products | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |