5 results (0.004 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A local privilege escalation vulnerability in Sophos Intercept X for Windows with Central Device Encryption 2024.2.0 and older allows writing of arbitrary files. • https://www.sophos.com/en-us/security-advisories/sophos-sa-20241002-cde-lpe • CWE-502: Deserialization of Untrusted Data CWE-1104: Use of Unmaintained Third Party Components •

CVSS: 3.9EPSS: 0%CPEs: 2EXPL: 0

An insecure data storage vulnerability allows a physical attacker with root privileges to retrieve TOTP secret keys from unlocked phones in Sophos Authenticator for Android version 3.4 and older, and Intercept X for Mobile (Android) before version 9.7.3495. Una vulnerabilidad de almacenamiento de datos no seguro permite a un atacante físico con privilegios de root recuperar claves secretas TOTP de teléfonos desbloqueados en Sophos Authenticator para Android versiones 3.4 y anteriores, e Intercept X for Mobile (Android) versiones anteriores a 9.7.3495 • https://www.sophos.com/en-us/security-advisories/sophos-sa-20220427-ixm-storage • CWE-922: Insecure Storage of Sensitive Information •

CVSS: 4.4EPSS: 0%CPEs: 3EXPL: 0

A local administrator could prevent the HMPA service from starting despite tamper protection using an unquoted service path vulnerability in the HMPA component of Sophos Intercept X Advanced and Sophos Intercept X Advanced for Server before version 2.0.23, as well as Sophos Exploit Prevention before version 3.8.3. Un administrador local podría evitar que el servicio HMPA sea iniciado a pesar de la protección contra manipulaciones mediante una vulnerabilidad de ruta de servicio no citada en el componente HMPA de Sophos Intercept X Advanced y Sophos Intercept X Advanced for Server versiones anteriores a 2.0.23, así como Sophos Exploit Prevention versiones anteriores a 3.8.3 • https://www.sophos.com/en-us/security-advisories/sophos-sa-20211126-ixa-hmpa-local-dos • CWE-428: Unquoted Search Path or Element •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

In multiple versions of Sophos Endpoint products for MacOS, a local attacker could execute arbitrary code with administrator privileges. En múltiples versiones de los productos Sophos Endpoint para MacOS, un atacante local podría ejecutar código arbitrario con privilegios de administrador • https://community.sophos.com/b/security-blog https://community.sophos.com/b/security-blog/posts/resolved-lpe-in-endpoint-for-macos-cve-2021-25264 •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. NOTE: the vendor feels that this does not apply to endpoint-protection products because the virus would be detected upon extraction. El motor de análisis Sophos AV versiones anteriores a 14-01-2020 permite una omisión de la detección de virus por medio de un archivo ZIP diseñado. Esto afecta a Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server y Secure Web Gateway. • https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.html https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9363 • CWE-436: Interpretation Conflict •