First published: Fri Sep 04 2015(Updated: )
SQL injection vulnerability in the Sophos Cyberoam CR500iNG-XP firewall appliance with CyberoamOS 10.6.2 MR-1 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter to login.xml.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cyberoam Cyberoamos | =10.6.2 | |
Cyberoam Cyberoamos | =10.6.2-beta1 | |
Cyberoam Cyberoamos | =10.6.2-beta2 | |
Cyberoam Cyberoamos | =10.6.2-maintenance_release-1 | |
Cyberoam Cyberoamos | =10.6.2-rc1 | |
Cyberoam CR500iNG-XP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6811 is considered a high severity vulnerability due to its potential for unauthorized access and data manipulation through SQL injection.
To fix CVE-2015-6811, upgrade your Sophos Cyberoam CR500iNG-XP firewall appliance to a version beyond CyberoamOS 10.6.2 MR-1.
CVE-2015-6811 is a SQL injection vulnerability that allows remote attackers to execute arbitrary SQL commands.
Yes, if you are using the Sophos Cyberoam CR500iNG-XP firewall appliance with CyberoamOS versions 10.6.2 and earlier, you are at risk.
The attack vector for CVE-2015-6811 is through the username parameter in the login.xml file, allowing attackers to exploit SQL injection.