First published: Mon Feb 24 2020(Updated: )
The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. NOTE: the vendor feels that this does not apply to endpoint-protection products because the virus would be detected upon extraction.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sophos Cloud Optix | <2020-01-14 | |
Sophos Endpoint Protection | <2020-01-14 | |
Sophos Intercept X Endpoint | <2020-01-14 | |
Sophos Intercept X For Server | <2020-01-14 | |
Sophos Mobile | <2020-01-14 | |
Sophos Secure Web Gateway | <2020-01-14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9363 is a vulnerability in the Sophos AV parsing engine that allows virus-detection bypass via a crafted ZIP archive.
CVE-2020-9363 affects Sophos Endpoint Protection, Sophos Cloud Optix, Sophos Mobile, Sophos Intercept X Endpoint, Sophos Intercept X for Server, and Sophos Secure Web Gateway.
CVE-2020-9363 has a severity rating of 7.8 (High).
A virus-detection bypass can be achieved by using a crafted ZIP archive.
You can find more information about CVE-2020-9363 in the following references: [https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.html](https://blog.zoller.lu/p/release-mode-coordinated-disclosure-ref.html) and [https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9363](https://community.sophos.com/b/security-blog/posts/sophos-comments-to-cve-2020-9363).