HIGH · 7.8

CVE-2020-9363

The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Ser...

Vulnerability Description

The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. NOTE: the vendor feels that this does not apply to endpoint-protection products because the virus would be detected upon extraction.

CVSS Score

7.8

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
SophosCloud Optix< 2020-01-14
SophosEndpoint Protection< 2020-01-14
SophosIntercept X Endpoint< 2020-01-14
SophosIntercept X For Server< 2020-01-14
SophosMobile< 2020-01-14
SophosSecure Web Gateway< 2020-01-14

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-9363?

CVE-2020-9363 is a vulnerability with a CVSS score of 7.8 (HIGH). The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Ser...

How severe is CVE-2020-9363?

CVE-2020-9363 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-9363?

Check the references section above for vendor advisories and patch information. Affected products include: Sophos Cloud Optix, Sophos Endpoint Protection, Sophos Intercept X Endpoint, Sophos Intercept X For Server, Sophos Mobile.