Vulnerability Details : CVE-2016-7442
The Frontend component in Sophos UTM with firmware 9.405-5 and earlier allows local administrators to obtain sensitive password information by reading the "value" field of the proxy user settings in "system settings / scan settings / anti spam" configuration tab.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2016-7442
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 18 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-7442
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST |
4.4
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
0.8
|
3.6
|
NIST |
CWE ids for CVE-2016-7442
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7442
-
http://www.securitytracker.com/id/1036931
Sophos UTM Access Control Flaw Lets Remote Authenticated Administrative Users View Certain Passwords on the Target System - SecurityTracker
-
http://www.securityfocus.com/archive/1/539518/100/0/threaded
SecurityFocus
-
http://www.securityfocus.com/bid/93266
Sophos UTM Multiple Local Information Disclosure Vulnerabilities
Products affected by CVE-2016-7442
- cpe:2.3:a:sophos:unified_threat_management_software:*:*:*:*:*:*:*:*