2 results (0.002 seconds)

CVSS: 4.4EPSS: 0%CPEs: 3EXPL: 0

A local administrator could prevent the HMPA service from starting despite tamper protection using an unquoted service path vulnerability in the HMPA component of Sophos Intercept X Advanced and Sophos Intercept X Advanced for Server before version 2.0.23, as well as Sophos Exploit Prevention before version 3.8.3. Un administrador local podría evitar que el servicio HMPA sea iniciado a pesar de la protección contra manipulaciones mediante una vulnerabilidad de ruta de servicio no citada en el componente HMPA de Sophos Intercept X Advanced y Sophos Intercept X Advanced for Server versiones anteriores a 2.0.23, así como Sophos Exploit Prevention versiones anteriores a 3.8.3 • https://www.sophos.com/en-us/security-advisories/sophos-sa-20211126-ixa-hmpa-local-dos • CWE-428: Unquoted Search Path or Element •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. NOTE: the vendor feels that this does not apply to endpoint-protection products because the virus would be detected upon extraction. El motor de análisis Sophos AV versiones anteriores a 14-01-2020 permite una omisión de la detección de virus por medio de un archivo ZIP diseñado. Esto afecta a Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server y Secure Web Gateway. • https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.html https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9363 • CWE-436: Interpretation Conflict •