Impact
A flaw in Cato Networks Socket allows an authenticated attacker who can access the internal web interface to inject system commands. By supplying crafted input, the attacker can cause the application to execute arbitrary commands with root privileges on the Socket device, creating a full remote code execution danger reflected in the high CVSS score and the underlying CWE identifiers for input validation and command execution.
Affected Systems
The vulnerability exists in all Socket releases prior to version 25 of the Cato Networks appliance. Any deployment of those versions that exposes the web interface and allows authenticated access can be impacted.
Risk and Exploitability
The CVSS base score of 8.3 indicates high severity, and while the EPSS score is unavailable and the flaw is not listed in the KEV catalog, the impact of running arbitrary commands as root remains critical. Attackers need valid credentials to reach the web UI; once authenticated they can deliver commands that compromise the entire device. The combination of a high severity rating with authenticated access through a web interface makes this a priority for rapid remediation.
OpenCVE Enrichment