Vulnerability Description
The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. NOTE: the vendor feels that this does not apply to endpoint-protection products because the virus would be detected upon extraction.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sophos | Cloud Optix | < 2020-01-14 |
| Sophos | Endpoint Protection | < 2020-01-14 |
| Sophos | Intercept X Endpoint | < 2020-01-14 |
| Sophos | Intercept X For Server | < 2020-01-14 |
| Sophos | Mobile | < 2020-01-14 |
| Sophos | Secure Web Gateway | < 2020-01-14 |
Related Weaknesses (CWE)
References
- https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.htmlThird Party Advisory
- https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9Vendor Advisory
- https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.htmlThird Party Advisory
- https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9Vendor Advisory
FAQ
What is CVE-2020-9363?
CVE-2020-9363 is a vulnerability with a CVSS score of 7.8 (HIGH). The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Ser...
How severe is CVE-2020-9363?
CVE-2020-9363 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-9363?
Check the references section above for vendor advisories and patch information. Affected products include: Sophos Cloud Optix, Sophos Endpoint Protection, Sophos Intercept X Endpoint, Sophos Intercept X For Server, Sophos Mobile.