ID

VAR-202002-1069


CVE

CVE-2020-9363


TITLE

plural Sophos Product input verification vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-002411

DESCRIPTION

The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. NOTE: the vendor feels that this does not apply to endpoint-protection products because the virus would be detected upon extraction. plural Sophos The product contains an input verification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Attackers can exploit this vulnerability to bypass virus detection with the help of specially crafted ZIP files

Trust: 1.71

sources: NVD: CVE-2020-9363 // JVNDB: JVNDB-2020-002411 // VULHUB: VHN-187488

AFFECTED PRODUCTS

vendor:sophosmodel:cloud optixscope:ltversion:2020-01-14

Trust: 1.0

vendor:sophosmodel:mobilescope:ltversion:2020-01-14

Trust: 1.0

vendor:sophosmodel:intercept x for serverscope:ltversion:2020-01-14

Trust: 1.0

vendor:sophosmodel:endpoint protectionscope:ltversion:2020-01-14

Trust: 1.0

vendor:sophosmodel:intercept x endpointscope:ltversion:2020-01-14

Trust: 1.0

vendor:sophosmodel:secure web gatewayscope:ltversion:2020-01-14

Trust: 1.0

vendor:sophosmodel:cloud optixscope:eqversion:2020-01-14

Trust: 0.8

vendor:sophosmodel:endpoint protectionscope:eqversion:2020-01-14

Trust: 0.8

vendor:sophosmodel:intercept x for serverscope:eqversion:2020-01-14

Trust: 0.8

vendor:sophosmodel:intercept x endpointscope:eqversion:2020-01-14

Trust: 0.8

vendor:sophosmodel:mobilescope:eqversion:2020-01-14

Trust: 0.8

vendor:sophosmodel:secure web gatewayscope:eqversion:2020-01-14

Trust: 0.8

sources: JVNDB: JVNDB-2020-002411 // NVD: CVE-2020-9363

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-9363
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-002411
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202002-1108
value: HIGH

Trust: 0.6

VULHUB: VHN-187488
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-9363
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-002411
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-187488
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-9363
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-002411
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-187488 // JVNDB: JVNDB-2020-002411 // CNNVD: CNNVD-202002-1108 // NVD: CVE-2020-9363

PROBLEMTYPE DATA

problemtype:CWE-436

Trust: 1.1

problemtype:CWE-20

Trust: 0.9

sources: VULHUB: VHN-187488 // JVNDB: JVNDB-2020-002411 // NVD: CVE-2020-9363

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202002-1108

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202002-1108

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-002411

PATCH

title:Top Pageurl:https://www.sophos.com/en-us.aspx

Trust: 0.8

title:Multiple Sophos Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=111209

Trust: 0.6

sources: JVNDB: JVNDB-2020-002411 // CNNVD: CNNVD-202002-1108

EXTERNAL IDS

db:NVDid:CVE-2020-9363

Trust: 2.5

db:JVNDBid:JVNDB-2020-002411

Trust: 0.8

db:CNNVDid:CNNVD-202002-1108

Trust: 0.7

db:VULHUBid:VHN-187488

Trust: 0.1

sources: VULHUB: VHN-187488 // JVNDB: JVNDB-2020-002411 // CNNVD: CNNVD-202002-1108 // NVD: CVE-2020-9363

REFERENCES

url:https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.html

Trust: 2.5

url:https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9363

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-9363

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9363

Trust: 0.8

url:https://vigilance.fr/vulnerability/sophos-endpoint-protection-vulnerability-via-zip-archive-bypass-31671

Trust: 0.6

sources: VULHUB: VHN-187488 // JVNDB: JVNDB-2020-002411 // CNNVD: CNNVD-202002-1108 // NVD: CVE-2020-9363

SOURCES

db:VULHUBid:VHN-187488
db:JVNDBid:JVNDB-2020-002411
db:CNNVDid:CNNVD-202002-1108
db:NVDid:CVE-2020-9363

LAST UPDATE DATE

2024-11-23T22:55:17.343000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-187488date:2022-04-18T00:00:00
db:JVNDBid:JVNDB-2020-002411date:2020-03-13T00:00:00
db:CNNVDid:CNNVD-202002-1108date:2022-04-19T00:00:00
db:NVDid:CVE-2020-9363date:2024-11-21T05:40:29.150

SOURCES RELEASE DATE

db:VULHUBid:VHN-187488date:2020-02-24T00:00:00
db:JVNDBid:JVNDB-2020-002411date:2020-03-13T00:00:00
db:CNNVDid:CNNVD-202002-1108date:2020-02-24T00:00:00
db:NVDid:CVE-2020-9363date:2020-02-24T16:15:13.250