A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11
Published 2020-09-25 04:23:05
Updated 2023-10-17 17:15:10
Source MITRE
View at NVD,   CVE.org
Vulnerability category: Execute code

CVE-2020-25223 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
Sophos SG UTM Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM.
Added on 2022-03-25 Action due date 2022-04-15

Exploit prediction scoring system (EPSS) score for CVE-2020-25223

97.52%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2020-25223

  • Sophos UTM WebAdmin SID Command Injection
    Disclosure Date: 2020-09-18
    First seen: 2022-12-23
    exploit/linux/http/sophos_utm_webadmin_sid_cmd_injection
    This module exploits an SID-based command injection in Sophos UTM's WebAdmin interface to execute shell commands as the root user. Authors: - Justin Kennedy - wvu <wvu@metasploit.com>

CVSS scores for CVE-2020-25223

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
10.0
HIGH AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST

CWE ids for CVE-2020-25223

References for CVE-2020-25223

Products affected by CVE-2020-25223

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!