Filtered by vendor Sophos
Subscriptions
Filtered by product Xg Firewall
Subscriptions
Total
13 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-3713 | 1 Sophos | 2 Xg Firewall, Xg Firewall Firmware | 2024-11-21 | 8.8 High |
A code injection vulnerability allows adjacent attackers to execute code in the Wifi controller of Sophos Firewall releases older than version 19.5 GA. | ||||
CVE-2022-3711 | 1 Sophos | 2 Xg Firewall, Xg Firewall Firmware | 2024-11-21 | 4.3 Medium |
A post-auth read-only SQL injection vulnerability allows users to read non-sensitive configuration database contents in the User Portal of Sophos Firewall releases older than version 19.5 GA. | ||||
CVE-2022-3710 | 1 Sophos | 2 Xg Firewall, Xg Firewall Firmware | 2024-11-21 | 2.7 Low |
A post-auth read-only SQL injection vulnerability allows API clients to read non-sensitive configuration database contents in the API controller of Sophos Firewall releases older than version 19.5 GA. | ||||
CVE-2022-3709 | 1 Sophos | 2 Xg Firewall, Xg Firewall Firmware | 2024-11-21 | 6.8 Medium |
A stored XSS vulnerability allows admin to super-admin privilege escalation in the Webadmin import group wizard of Sophos Firewall releases older than version 19.5 GA. | ||||
CVE-2022-3696 | 1 Sophos | 2 Xg Firewall, Xg Firewall Firmware | 2024-11-21 | 7.2 High |
A post-auth code injection vulnerability allows admins to execute code in Webadmin of Sophos Firewall releases older than version 19.5 GA. | ||||
CVE-2022-3226 | 1 Sophos | 2 Xg Firewall, Xg Firewall Firmware | 2024-11-21 | 7.2 High |
An OS command injection vulnerability allows admins to execute code via SSL VPN configuration uploads in Sophos Firewall releases older than version 19.5 GA. | ||||
CVE-2020-15069 | 1 Sophos | 2 Xg Firewall, Xg Firewall Firmware | 2024-11-21 | 9.8 Critical |
Sophos XG Firewall 17.x through v17.5 MR12 allows a Buffer Overflow and remote code execution via the HTTP/S Bookmarks feature for clientless access. Hotfix HF062020.1 was published for all firewalls running v17.x. | ||||
CVE-2020-12271 | 1 Sophos | 2 Sfos, Xg Firewall | 2024-11-21 | 9.8 Critical |
A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords) | ||||
CVE-2020-11503 | 1 Sophos | 2 Sfos, Xg Firewall | 2024-11-21 | 9.8 Critical |
A heap-based buffer overflow in the awarrensmtp component of Sophos XG Firewall v17.5 MR11 and older potentially allows an attacker to run arbitrary code remotely. | ||||
CVE-2018-16118 | 1 Sophos | 2 Sfos, Xg Firewall | 2024-11-21 | N/A |
A shell escape vulnerability in /webconsole/APIController in the API Configuration component of Sophos XG firewall 17.0.8 MR-8 allows remote attackers to execute arbitrary OS commands via shell metachracters in the "X-Forwarded-for" HTTP header. | ||||
CVE-2018-16117 | 1 Sophos | 2 Sfos, Xg Firewall | 2024-11-21 | 8.8 High |
A shell escape vulnerability in /webconsole/Controller in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary OS commands via shell metacharacters in the "dbName" POST parameter. | ||||
CVE-2018-16116 | 1 Sophos | 2 Sfos, Xg Firewall | 2024-11-21 | N/A |
SQL injection vulnerability in AccountStatus.jsp in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary SQL commands via the "username" GET parameter. | ||||
CVE-2017-18014 | 1 Sophos | 2 Sfos, Xg Firewall | 2024-11-21 | N/A |
An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -> Log Viewer -> in the filter option "Web Server Protection") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the "User-Agent" parameter in the HTTP POST request. |
Page 1 of 1.