CVE-2015-6811
Cyberoam Firewall CR500iNG-XP 10.6.2 MR-1 - Blind SQL Injection
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
SQL injection vulnerability in the Sophos Cyberoam CR500iNG-XP firewall appliance with CyberoamOS 10.6.2 MR-1 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter to login.xml.
Vulnerabilidad de inyección SQL en el dispositivo de firewall Sophos Cyberoam CR500iNG-XP con CyberoamOS 10.6.2 MR-1 y versiones anteriores, permite a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro username en login.xml.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2015-09-04 CVE Reserved
- 2015-09-04 CVE Published
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- 2024-09-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/38034 | 2024-09-16 | |
http://packetstormsecurity.com/files/133378/Cyberoam-CR500iNG-XP-10.6.2-MR-1-Blind-SQL-Injection.html | 2024-09-16 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cyberoam Search vendor "Cyberoam" | Cyberoamos Search vendor "Cyberoam" for product "Cyberoamos" | 10.6.2 Search vendor "Cyberoam" for product "Cyberoamos" and version "10.6.2" | - |
Affected
| in | Cyberoam Search vendor "Cyberoam" | Cr500ing-xp Search vendor "Cyberoam" for product "Cr500ing-xp" | - | - |
Safe
|
Cyberoam Search vendor "Cyberoam" | Cyberoamos Search vendor "Cyberoam" for product "Cyberoamos" | 10.6.2 Search vendor "Cyberoam" for product "Cyberoamos" and version "10.6.2" | beta1 |
Affected
| in | Cyberoam Search vendor "Cyberoam" | Cr500ing-xp Search vendor "Cyberoam" for product "Cr500ing-xp" | - | - |
Safe
|
Cyberoam Search vendor "Cyberoam" | Cyberoamos Search vendor "Cyberoam" for product "Cyberoamos" | 10.6.2 Search vendor "Cyberoam" for product "Cyberoamos" and version "10.6.2" | beta2 |
Affected
| in | Cyberoam Search vendor "Cyberoam" | Cr500ing-xp Search vendor "Cyberoam" for product "Cr500ing-xp" | - | - |
Safe
|
Cyberoam Search vendor "Cyberoam" | Cyberoamos Search vendor "Cyberoam" for product "Cyberoamos" | 10.6.2 Search vendor "Cyberoam" for product "Cyberoamos" and version "10.6.2" | maintenance_release-1 |
Affected
| in | Cyberoam Search vendor "Cyberoam" | Cr500ing-xp Search vendor "Cyberoam" for product "Cr500ing-xp" | - | - |
Safe
|
Cyberoam Search vendor "Cyberoam" | Cyberoamos Search vendor "Cyberoam" for product "Cyberoamos" | 10.6.2 Search vendor "Cyberoam" for product "Cyberoamos" and version "10.6.2" | rc1 |
Affected
| in | Cyberoam Search vendor "Cyberoam" | Cr500ing-xp Search vendor "Cyberoam" for product "Cr500ing-xp" | - | - |
Safe
|