First published: Tue Dec 06 2022(Updated: )
The admin user interface in Proofpoint Enterprise Protection (PPS/PoD) contains a command injection vulnerability that enables an admin to execute commands beyond their allowed scope. This affects all versions 8.19.0 and below.
Credit: security@proofpoint.com security@proofpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Proofpoint Enterprise Protection | <=8.19.0 | |
<=8.19.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this command injection vulnerability in Proofpoint Enterprise Protection is CVE-2022-46333.
The severity of CVE-2022-46333 is high with a severity value of 7.2.
All versions 8.19.0 and below of Proofpoint Enterprise Protection are affected by CVE-2022-46333.
The command injection vulnerability in Proofpoint Enterprise Protection allows an admin to execute commands beyond their allowed scope.
Yes, Proofpoint has released a security advisory with instructions on how to mitigate the vulnerability. Please refer to the following reference for more details: [Proofpoint Security Advisory PFPT-SA-2022-0003](https://www.proofpoint.com/security/security-advisories/pfpt-sa-2022-0003)