Attacker Value
Unknown
(1 user assessed)
Exploitability
Unknown
(1 user assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
1

CVE-2020-29574

Disclosure Date: December 11, 2020
Exploited in the Wild
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely.

Add Assessment

1
Technical Analysis

Interesting, this slid under the radar a bit. I’m not seeing any definitive evidence that this was confirmed to be exploited in the wild, but the Bleeping Computer article on it from December 14, 2020 says Sophos was investigating whether it had been exploited. There was kiiiiind of a lot going on December 14, 2020, what with the SolarWinds supply chain attack revelations ramping up, so I’m not surprised there was no further community attention paid to this. In any event, upgrading to supported products probably a good call.

CVSS V3 Severity and Metrics
Base Score:
9.8 Critical
Impact Score:
5.9
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • sophos

Products

  • cyberoamos

Exploited in the Wild

Reported by:

Additional Info

Technical Analysis