Sophos Cyberoam SQLi (CVE-2020-29574)

critical Nessus Plugin ID 235721

Synopsis

The remote host is potentially missing a security update.

Description

The version of Sophos Cyberoam installed on the remote host is potentially affected by an SQL injection vulnerability.
An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Cyberoam is no longer supported . Upgrade to a supported product.

See Also

http://www.nessus.org/u?9d91aaea

http://www.nessus.org/u?11d4d792

Plugin Details

Severity: Critical

ID: 235721

File Name: sophos_cyberoam_2020_12_4.nasl

Version: 1.1

Type: remote

Family: CGI abuses

Published: 5/12/2025

Updated: 5/12/2025

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-29574

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:sophos:cyberoamos

Required KB Items: Settings/ParanoidReport, installed_sw/Sophos CyberoamOS

Patch Publication Date: 12/11/2020

Vulnerability Publication Date: 12/11/2020

CISA Known Exploited Vulnerability Due Dates: 2/27/2025

Reference Information

CVE: CVE-2020-29574