CVE-2020-25223 Scanner
CVE-2020-25223 scanner - Remote Code Execution (RCE) vulnerability in Sophos SG UTM
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 1 day
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
Sophos SG UTM is a popular security product used by companies and organizations to protect their network and keep it safe from cybercriminals. This product is an all-in-one security gateway that provides the necessary tools for web protection, email filtering, network security, and wireless security. Sophos SG UTM is designed to offer high-level safeguards to companies of all sizes, from small businesses to large enterprises, who want to ensure their digital assets remain secure.
CVE-2020-25223 is a remote code execution vulnerability that was recently detected in Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11. This vulnerability arises due to an incorrect validation of user input in the WebAdmin of the product. Attackers can exploit this vulnerability to execute arbitrary code, thereby compromising the security of the system.
When this vulnerability is exploited, cybercriminals can gain unauthorized access to sensitive information, take control of the network, and cause severe damage to the company's reputation. They can also launch malware attacks and steal confidential data, resulting in significant financial losses for the organization.
Thanks to s4e.io, individuals and businesses alike can easily learn about potential vulnerabilities in their digital assets. The pro features of s4e.io enable users to quickly identify potential threats and take appropriate action to protect their networks, systems, and data. By being proactive in identifying and addressing vulnerabilities, organizations can maintain their digital assets' safety and security.
REFERENCES