Firewall Software Vulnerabilities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Vendor

Identifying all affected vendors is a good starting point for an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Product

F5 BIG-IP395
Cisco ASA282
Palo Alto PAN-OS163
Cisco Firepower Threat Defense155
Fortinet FortiOS116

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation

Official Fix1788
Temporary Fix2
Workaround78
Unavailable41
Not Defined742

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High98
Functional8
Proof-of-Concept423
Unproven111
Not Defined2011

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector

Not Defined0
Physical4
Local249
Adjacent128
Network2270

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication

Not Defined0
High122
Low746
None1783

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction

Not Defined0
Required422
None2229

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base

≤10
≤21
≤321
≤4186
≤5343
≤6650
≤7540
≤8644
≤9164
≤10102

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤21
≤326
≤4228
≤5456
≤6595
≤7681
≤8451
≤9151
≤1062

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤23
≤358
≤4288
≤5379
≤6740
≤7320
≤8650
≤9113
≤10100

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤32
≤417
≤568
≤6195
≤7189
≤8394
≤9156
≤10107

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤33
≤48
≤541
≤632
≤731
≤851
≤938
≤108

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤52
≤61
≤70
≤82
≤91
≤103

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤71
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day

<1k214
<2k367
<5k659
<10k560
<25k657
<50k176
<100k15
≥100k3

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k1889
<2k183
<5k299
<10k190
<25k86
<50k4
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Products (594): 3proxy, 2345 Security Guard, A10 ACOS Web Application Firewall, acFreeProxy, Agnitum Outpost Firewall, AlgoSec Firewall Analyzer, all-in-one-wp-security-and-firewall Plugin, All-In-One Security Security and Firewall Plugin, All In One WP Security , All In One WP Security & Firewall Plugin, AnalogX Proxy, Anon Proxy Server, Anti-Malware Security and Brute-Force Firewall Plugin, apt-www-proxy, Armorlogic Profense Web Application Firewall, Artica Proxy, Artica Proxy CE, Artica Web Proxy, Astaro Firewall, at32 Reverse Proxy, AtGuard Personal Firewall, Avsoft Kerio WinRoute Firewall, Axent Raptor Firewall, Banu Tinyproxy, Barracuda Firewall, Barracuda IMFirewall, Barracuda Spam, Barracuda Spam Firewall, Barracuda Virus Firewall, Barracuda Web Application Firewall, Barracuda Web Application Firewall Online Demo, Barracuda Web Firewall, Barracudanetworks Spam , Barracudanetworks Virus Firewall, Barracuda Networks Barracuda Spam Firewall, Bitly oauth2_proxy, Bluecoat ProxyAV, Bluecoat ProxyClient, Bluecoat Proxysgos, BlueCoat Webproxy, Bluecoat Webproxy, Bluecoat WinProxy, Blue Coat Advanced Secure Gateway, Blue Coat CacheFlow, Blue Coat ProxySG, Borderware Firewall Server, Broadcom ASG, Broadcom ProxySG, BrowserUp Proxy, Bsdperimeter pfSense, BSD Perimeter pfSense, Buzzscripts BuzzyWall, BuzzyWall, C-Note Squid Auth LDAP, CA Personal Firewall, capsule-proxy, Cerbere Proxy Server, Charles Proxy, Check Point Endpoint Security Client, Check Point Firewall, Check Point Firewall-1, Check point Firewall-1, Check Point Firewall-1 NG, Check Point Firewall-1 PKI Web Service, Check Point FireWall-1 VSX NG, Check Point Harmony Endpoint, Check Point VPN-1, Check point VPN-1, Check Point ZoneAlarm, check point zonealarm, Check Point ZoneAlarm Extreme Security, Check Point Software Firewall-1, Cisco 1000 Series Integrated Services Router, Cisco 3000 Series Industrial Security Appliance, Cisco 4000 Series Integrated Services Router, Cisco AMP, Cisco AnyConnect Secure Mobility Client, Cisco ASA, Cisco ASA-CX, Cisco ASA-CX Content-Aware Security, Cisco ASAv, Cisco ASA 1000V, Cisco Asa 1000v Cloud Firewall, Cisco ASA 5500, Cisco ASA 5580, Cisco ASA CX, Cisco ASA CX Context-Aware Security, Cisco ASA NGFW, Cisco ASA Software, Cisco Catalyst 8000V Edge Software, Cisco Catalyst 8200 Series Edge Platform, Cisco Catalyst 8300 Series Edge Platform, Cisco Catalyst 8500L Series Edge Platform, Cisco Cisco RV130W Wireless-N Multifunction VPN Router, Cisco Cisco RV215W Wireless-N VPN Router, Cisco Cloud Services Router 1000V Series, Cisco Cyber Vision, Cisco FirePOWER, Cisco Firepower 2100, Cisco Firepower 4100, Cisco Firepower 9000, Cisco Firepower 9300, Cisco Firepower Device Manager, Cisco Firepower Device Manager On-Box, Cisco Firepower Extensible Operating System, Cisco FirePOWER Management Center, Cisco Firepower Management Center, Cisco Firepower Management Center Software, Cisco FirePOWER Services, Cisco FirePOWER Services Software for ASA, Cisco FirePOWER Software for ASA, Cisco Firepower System Software, Cisco Firepower Threat Defense, Cisco Firepower Threat Defense Software, Cisco Firepower User Agent, Cisco Firepower User Agent Software, Cisco FireSIGHT, Cisco FireSIGHT System Software, Cisco Firewall, Cisco Firewall Services Module, Cisco Firewall Services Module Software, Cisco FXOS, Cisco Industrial Security Appliance, Cisco Integrated Services Router, Cisco Integrated Services Virtual Router, Cisco Meraki MX Security Appliance, Cisco Meraki MX Security Appliances, Cisco NGIPS Software, Cisco NX-OS, Cisco Open Source Snort 2, Cisco PIX, Cisco PIX 500, Cisco Pix 500, Cisco Pix Asa Finesse Operation System, Cisco Pix Firewall, Cisco Pix Firewall 520, Cisco PIX Firewall Manager, Cisco PIX Private Link, Cisco Prime Security Manager, Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, Cisco RV215W Wireless-N VPN Router, Cisco Secure Firewall 3100, Cisco Services Router 1000V, Cisco Snort Detection Engine, Cisco Umbrella Secure Internet Gateway, Cisco Umbrella Secure Web Gateway, Cisco Web Security Appliance, Clavister Eagle E7, Comodo Firewall Pro, Comodo Personal Firewall, Comodo UTM Firewall, Computalynx CProxy, Computalynx CProxy Server, ConfigServer Configserver Security Firewall, CSM Proxy, CUJO Smart Firewall, Daniel Mealha Cabrita Ziproxy, Darold SquidClamav, Darold squidclamav, DCN Firewall DCME-520, Delegate Proxy, Dell SonicWall, DELL SonicWALL, Dell SonicWALL GMS, Dell SonicWall GMS Virtual Appliance, Dell SonicWALL NetExtender, Dell Sonicwall Network Security Appliance 2400, Dell SonicWall Scrutinizer, Dell SonicWALL Scrutinizer, Dell Sonicwall Scrutinizer With Flow Analytics Module, Dell SonicWall TotalSecure TZ 100, Dell Sonicwall Universal Management Appliance E5000, Dell SonicWall ViewPoint, Dell UMA, Dell ViewPoint, Deny All Firewall Plugin, dircproxy, dproxy, dproxy-nexgen, Dr.Web Firewall, Duo Authentication Proxy, Endian Firewall, Endian Firewall Community, Endian UTM Firewall, ESET Personal Firewall NDIS filter, Extensible Service Proxy, F5 Advanced WAF, F5 ASM, F5 BIG-IP, F5 BIG-IP AAM, F5 BIG-IP Advanced WAF, F5 BIG-IP AF, F5 BIG-IP AFM, F5 BIG-IP Analytics, F5 BIG-IP APM, F5 BIG-IP APM AD, F5 BIG-IP APM Client, F5 BIG-IP APM Clients, F5 BIG-IP APM Client Troubleshooting Utility, F5 BIG-IP APM Edge Client, F5 BIG-IP Application Acceleration Manager, F5 BIG-IP Application Security Manager, F5 BIG-IP ASM, F5 BIG-IP CGNAT, F5 BIG-IP Configuration utility, F5 BIG-IP Controller for Kubernetes, F5 BIG-IP DataSafe, F5 BIG-IP DNS, F5 BIG-IP Edge Client, F5 BIG-IP FPS, F5 BIG-IP GTM, F5 BIG-IP Guided Configuration, F5 BIG-IP LTM, F5 BIG-IP LTM GSLB, F5 BIG-IP Manager, F5 BIG-IP PEM, F5 Big-IP Protocol Security Manager, F5 Big-ip Protocol Security Module, F5 BIG-IP Virtual Edition, F5 BIG-IP Virtual Server, F5 BIG-IQ, F5 BIG-IQ Centralized Management, F5 BIG-IQ Cloud, F5 Edge Gateway, F5 Enterprise Manager, F5 FirePass, F5 Firepass, F5 iWorkflow, F5 Orchestration, fastify-http-proxy, ffay lanproxy, Firewall, Firewallbuilder fwbuilder, firewalld, Firewall & Malware Scan Plugin, Fortech Proxy+, Fortinet FortiADC, Fortinet FortiClient, Fortinet FortiGate, Fortinet Fortigate FortiDB, Fortinet FortiMail, Fortinet Fortinet firewall, Fortinet FortiOS, Fortinet FortiOS SSL-VPN, Fortinet FortiProxy, Fortinet FortiRecorder, Fortinet FortiSwitch, Fortinet FortiVoiceEnterprise, Fortinet FotiOS, Fotinet FortiOS, FreeProxy, freeradius3 for pfSense, FreeWeb, Funk Software Proxy, Fwbuilder Firewall Builder, Gaim HTTP Proxy, Gibraltar Gibraltar Firewall, GIPTables GIPTables Firewall, gomeplus-h5-proxy, GreenSQL GreenSQL Firewall, Grok Developments NetProxy, gssproxy, HAProxy, HAProxy Package, HCL Sametime Proxy, HCL Web Chat Client, hoppscotch proxyscotch, HP Praesidium Webproxy, http-proxy.js, Http-proxy, http-proxy-agent, https-proxy-agent, Huawei Honor Cube Wireless Router WS860s Firewall, IBM AIX eNetwork Firewall, IBM AS400 Firewall, IBM Sametime Proxy Server, IBM Secureway Firewall, IBM Secure External Authentication Server, IBM Secure Proxy, Igor Khasilev Oops Proxy Server, Imap Proxy, Imperva SecureSphere Web Application Firewall, Imperva Web Application Firewall, Ingate Firewall, InGate Firewall, ingate firewall, InGate SIParator, Initial Redirect Initial Redirect Squid Proxy Plug-in, Interactive Intelligence Interaction SIP Proxy, Internetnow Proxynow, IPCop Firewall, IPFire Firewall, isomorphic-git cors-proxy, jc21 Nginx Proxy Manager, Juniper NetScreen 5GT Firewall, Jupyter Server Proxy, Kerio Personal Firewall, kerio personal firewall, Kerio WinRoute Firewall, Kerio Winroute Firewall, KingSoft Personal Firewall 9, kube-rbac-proxy, LANCOM R&S Unified Firewall, libproxy, Ln-lab WebProxy, Looknstop Look 'n' Stop Firewall, Malwarebytes Binisoft Windows Firewall Control, MapProxy, mastercactapus proxyprotocol, McAfee Client Proxy, McAfee Firewall Reporter, McAfee Personal Firewall Plus, McAfee Skyhigh Secure Web Gateway, McAfee Unified Threat Management Firewall, McAfee UTM Firewall Appliance, McAfee Web Gateway, Microsoft ISA Proxy, Microsoft ISA Server, Microsoft Personal Firewall, Microsoft Proxy Server, Microsoft Web Proxy, mitmproxy, Multi-Tech Proxyserver, myproxy, Myproxy, My Firewall Plus, my firewall plus, National Science Foundation Squid, National Science Foundation Squid Web Proxy, National Science Foundation Squid Web Proxy Cache, NCSA MyProxy, NestJS Proxy, NetApp SANtricity Storage Manager, NetApp SANtricity Web Services Proxy, NetAsq IPS-Firewall, Netgate pfSense, Netgate pfSense Community Edition, Netgear ProSafe VPN Firewall, Network Associates Gauntlet Firewall, Nokia Firewall Appliance, Nokia IPSO, Nokia IPSO Voyager, Nortel Switched Firewall, Novell Client Firewall, NuFW Firewall, OAuth2-Proxy, OAuth2 Proxy, Octopus Server, Octopus Server Web Request Proxy, Office Efficiencies SafeSquid, Online Armor Personal Firewall, OPNsense, Oracle iPlanet Web Proxy Server, Oracle Sun Java System Web Proxy Server, Oracle Sun Microsystems SunScreen Firewall, OSU Open Source Lab VNCAuthProxy, Palo-Alto PAN-OS, Palo Alto Firewall, Palo Alto PAN-OS, PAN-OS, ParosProxy, PC Tools Firewall, Pexip Reverse Proxy, Pexip TURN Server, pfSense, pfsense, pfSense-pkg-WireGuard, pfSense Firewall, pfSense pfBlockerNG, pfSense Snort package, pfSense Suricata package, pfSense CE, pfSense Plus, phion airlock Web Application Firewall, PHP-Proxy, PHProxy, phpSquidPass, PHP Proxy, Pires go-proxyproto, Podium Layout, Podium Proxy, Privacyware Privatefirewall, ProofPoint Protection Server Email Firewall, Proxomitron Proxy Server, proxy.js, proxy.py, Proxy, Proxy-pro Professional Gatekeeper, ProxyChains-NG, Proxyee-Down, Proxygen, Proxyman, proxystatistics Module, Proxytunnel, proxytunnel, Proxy Anket, PSI GridConnect GmbH IEC104 Security Proxy, PSI GridConnect GmbH Smart Telecontrol Unit, PSI GridConnect GmbH Smart Telecontrol Unit TCG, PSI GridConnect GmbH Telecontrol Gateway, PSI GridConnect GmbH Telecontrol Gateway 3G, PSI GridConnect GmbH Telecontrol Gateway VM, PSI GridConnect GmbH Telecontrol Gateway XS-MU, PSOProxy Server, Puppet Firewall Module, Pwicorp PrivateFirewall, Qbik WinGate Proxy, QNAP Proxy Server, radsecproxy, RealNetworks RealSystem Proxy, RealNetworks RealSystem Server, Red Hat system-config-firewall, Replicom Proxyview, Reverse Proxy Auth Plugin, rhn-proxy, RTPproxy, rWeb HTTP Proxy, Safenet Authentication Service TokenValidator Proxy Agent, SAP PowerDesigner Proxy, SAP Sybase Unwired Platform Online Data Proxy, SapporoWorks WinProxy, sDNSProxy.exe, Security Firewall, Malware Scanner, Secure Login and Backup Plugin, Shanghai 2345 Security Guard, Sidewinder G2 Firewall, simpleproxy, smart_proxy_openscap, smtp.proxy, Snapgear Lite+ Firewall, SOCKS 4 Proxy, SOCKS 5 Proxy, Softsphere DefenseWall Personal Firewall, SolarWinds Firewall Security Manager, SonicWall, SonicWALL Analytics On-Prem, SonicWALL Analyzer, SonicWALL AntiSpam , SonicWALL Aventail Sra Ex7000, SonicWALL Continuous Data Protection, SonicWALL Directory Services Connector, SonicWall E-mail Security, SonicWALL Firewall, SonicWALL Global Management System, SonicWALL Global VPN Client, SonicWALL GMS, SonicWall GMS, SonicWALL installer Activex Control, SonicWALL NetExtender, SonicWALL NSA, SonicWALL Pro, SonicWALL Scrutinizer, SonicWALL Scrutinizer Dashboard, SonicWALL SMA100, SonicWall SMA100, SonicWALL SMA1000, SonicWALL SMA 100, SonicWALL SMA 200, SonicWALL SMA 210, SonicWALL SMA 400, SonicWALL SMA 410, SonicWALL SMA 500v, SonicWALL SOHO, SonicWALL SOHO3, SonicWALL SOHO Firewall, SonicWALL SonicOS, SonicWALL SonicOSv, SonicWALL SSL-VPN End-Point Interrogator, SonicWALL SSL-VPN NetExtender Windows Client, SonicWALL SSL-VPN VirtualOffice, SonicWALL SSL VPN, SonicWall SSL VPN, SonicWall Ssl Vpn 200, SonicWALL Switch, SonicWALL Tele2, SonicWALL UMA E5000, SonicWALL ViewPoint, SonicWALL Viewpoint, SonicWALL EMail, SonicWALL NetExtender Client, SonicWall NSM On-Prem, SonicWall SMA100, SonicWall SSLVPN SMA100, Sophos Cloud Optix, Sophos Cyberoam Firewall, Sophos EAS Proxy, Sophos Endpoint Protection, Sophos Firewall, Sophos Intercept X Endpoint, Sophos Intercept X for Server, Sophos Mobile, Sophos Secure Web Gateway., Sophos Secure Web Gateway Server, Sophos Web Appliance Remote, Sophos XG Firewall, Squid HTTP Proxy, Squid Proxy, Squid proxy, Squid Web Proxy, squidGuard, Stage File Proxy, StoneSoft Firewall Engine, StoneSoft StoneGate Firewall, Stormshield SNS Firewall, StreamAudio Chaincast Proxymanager Activex Control, Sun Java System Web Proxy Server, SuSEfirewall2, Symantec Advanced Secure Gateway, Symantec ASG, Symantec CacheFlow, Symantec Enterprise Firewall, Symantec Firewall, Symantec Norton Personal Firewall, Symantec ProxyClient, Symantec ProxySG, Symantec Raptor Firewall, Symantec Sygate Personal Firewall, Symantec VPN, Symantec VPN Appliance, Symantec VPN Appliances, Symantec Web Gateway, Tallemu Personal Firewall, Tiny Personal Firewall, Tinyproxy, Tips and Tricks HQ All In One WP Security & Firewall, TIS Firewall Toolkit, TIS Internet Firewall Toolkit, Tor Proxy, Trend Micro VPN Proxy Pro, Trojan-Proxy.Win32.Daemonize.i, Trojan-Proxy.Win32.Delf.ai, Trojan-Proxy.Win32.Ranky.ag, Trojan-Proxy.Win32.Ranky.dh, Trojan-Proxy.Win32.Ranky.gen, Trojan-Proxy.Win32.Ranky.z, Trojan-Proxy.Win32.Raznew.gen, Trojan-Proxy.Win32.Symbab.o, Trojan-Proxy.Win32.Wimain, Trustwave Secure Web Gateway, Tumbleweed Email Firewall, Tumbleweed Mailgate Email Firewall, Tumbleweed MailGate Email Firewall, Uiga Proxy, Undici.ProxyAgent, Uninett radsecproxy, Untangle Firewall NG, Untangle NG Firewall, up-imapproxy, Vergenet Perdition Mail Retrieval Proxy, Watchguard Firewall, WatchGuard SOHO Firewall, webdesproxy, Webproxy, webroot desktop firewall, Webroot Desktop Firewall, WinGate Proxy, YoungZSoft CCProxy, Yurunsoft YurunProxy, Ziproxy, ZoneAlarm, ZoneAlarm Anti-Ransomware, ZoneAlarm Antivirus, ZoneAlarm Firewall, ZoneLabs ZoneAlarm, ZoneLabs Zonealarm Security Suite, ZyWALL, Zyxel ATP, ZyXEL ATP500, ZyXEL UAG, Zyxel USG, ZyXEL USG, Zyxel USG20, ZyXEL USG40, ZyXEL USG1900, Zyxel USG Flex, Zyxel USG FLEX 50, Zyxel USG FLEX 100, Zyxel USG FLEX 200, Zyxel USG FLEX 500, Zyxel USG FLEX 700, Zyxel USG ZyWALL, Zyxel VPN, Zyxel ZyWALL, ZyXEL ZyWALL, Zyxel Zywall, ZyXEL ZyWall, ZyXEL ZyWALL310, ZyXEL ZyWALL1100, Zyxel Zywall 2, ZyXEL ZyWALL 2 Plus Internet Security Appliance, ZyXEL ZyWALL 10, ZyXEL ZyWALL 100, ZyXEL ZyWALL USG, Firewall Plugin

PublishedBaseTempVulnerabilityProductExpRemCTICVE
12/02/20224.64.5Sophos Firewall Webadmin Import Group Wizard cross site scriptingFirewallNot DefinedOfficial Fix1.63-CVE-2022-3709
12/02/20228.88.6Sophos Firewall Wifi Controller code injectionFirewallNot DefinedOfficial Fix1.19CVE-2022-3713
12/02/20224.34.2Sophos Firewall User Portal sql injectionFirewallNot DefinedOfficial Fix1.16CVE-2022-3711
12/02/20227.27.0Sophos Firewall Webadmin code injectionFirewallNot DefinedOfficial Fix1.32CVE-2022-3696
12/02/20227.27.0Sophos Firewall SSL VPN Configuration Upload os command injectionFirewallNot DefinedOfficial Fix1.28CVE-2022-3226
12/02/20222.72.6Sophos Firewall API Controller sql injectionFirewallNot DefinedOfficial Fix0.41CVE-2022-3710
11/22/20224.84.8All-In-One Security Security and Firewall Plugin cross-site request forgerySecurity and Firewall PluginNot DefinedNot Defined0.03CVE-2022-44737
11/16/20223.63.5Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.00CVE-2022-20936
11/16/20223.63.5Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.07CVE-2022-20935
11/16/20223.63.5Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.05CVE-2022-20932
11/16/20223.63.5Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.06CVE-2022-20905
11/16/20223.63.5Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.06CVE-2022-20872
11/16/20222.42.3Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.06CVE-2022-20843
11/16/20223.63.5Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.03CVE-2022-20840
11/16/20223.63.5Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.00CVE-2022-20839
11/16/20223.63.5Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.06CVE-2022-20838
11/16/20223.63.5Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.00CVE-2022-20836
11/16/20223.63.5Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.03CVE-2022-20835
11/16/20223.63.5Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.03CVE-2022-20834
11/16/20225.55.4Cisco Cyber Vision Snort Detection Engine heap inspectionCyber Vision/FirePOWER Services/Firepower Threat Defense/Meraki MX Security Appliances/Umbrella Secure Internet GatewayNot DefinedOfficial Fix0.06CVE-2022-20943
11/16/20226.36.1Cisco FirePOWER Management Center web management interface input validationFirePOWER Management CenterNot DefinedOfficial Fix0.04CVE-2022-20926
11/15/20223.53.5Reverse Proxy Auth Plugin Controller File System config.xml credentials storageReverse Proxy Auth PluginNot DefinedNot Defined0.03CVE-2022-45384
11/09/20222.42.3Cisco FirePOWER Management Center cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.00CVE-2022-20833
11/09/20222.42.3Cisco FirePOWER Management Center cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.04CVE-2022-20832
11/09/20222.42.3Cisco FirePOWER Management Center cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.00CVE-2022-20831
11/09/20226.56.2Cisco ASA/Firepower Threat Defense VPN authorizationASA/Firepower Threat DefenseNot DefinedOfficial Fix0.06CVE-2022-20928
11/09/20226.36.0Cisco FirePOWER Management Center command injectionFirePOWER Management CenterNot DefinedOfficial Fix0.05CVE-2022-20925
11/09/20225.35.1Cisco FirePOWER Management Center small space of random valuesFirePOWER Management CenterNot DefinedOfficial Fix0.00CVE-2022-20941
11/09/20224.34.1Cisco FirePOWER Management Center xml external entity referenceFirePOWER Management CenterNot DefinedOfficial Fix0.03CVE-2022-20938
11/09/20224.74.5Cisco FXOS/Firepower Threat Defense command injectionFXOS/Firepower Threat DefenseNot DefinedOfficial Fix0.06CVE-2022-20934
11/09/20224.74.5Cisco Firepower Threat Defense resource managementFirepower Threat DefenseNot DefinedOfficial Fix0.05CVE-2022-20949
11/09/20225.35.1Cisco Firepower Threat Defense SSL Decryption Policy information exposureFirepower Threat DefenseNot DefinedOfficial Fix0.03CVE-2022-20940
11/09/20225.35.1Cisco Firepower Threat Defense SIP Detection Engine/Snort 3 Detection Engine allocation of resourcesFirepower Threat DefenseNot DefinedOfficial Fix0.03CVE-2022-20950
11/09/20225.35.1Cisco Cyber Vision Snort SMB2 Detection Engine Policy heap inspectionCyber Vision/FirePOWER Services/Firepower Threat Defense/Meraki MX Security Appliance/Umbrella Secure Internet GatewayNot DefinedOfficial Fix0.03CVE-2022-20922
11/09/20227.57.2Cisco ASA/Firepower Threat Defense Dynamic Access Policy memory corruptionASA/Firepower Threat DefenseNot DefinedOfficial Fix0.03CVE-2022-20947
11/09/20226.56.2Cisco ASA/Firepower Threat Defense SNMP unknown vulnerabilityASA/Firepower Threat DefenseNot DefinedOfficial Fix0.06CVE-2022-20924
11/09/20227.57.2Cisco Firepower Management Center SSH resource consumptionFirepower Management Center/Firepower Threat DefenseNot DefinedOfficial Fix0.06CVE-2022-20854
11/09/20227.57.2Cisco Firepower Threat Defense Generic Routing Encapsulation heap-based overflowFirepower Threat DefenseNot DefinedOfficial Fix0.08CVE-2022-20946
11/09/20226.46.1Cisco Secure Firewall 3100 Secure Boot trust boundary violationSecure Firewall 3100Not DefinedOfficial Fix0.03CVE-2022-20826
11/09/20226.56.2Cisco ASA/Firepower Threat Defense SSL/TLS denial of serviceASA/Firepower Threat DefenseNot DefinedOfficial Fix0.08CVE-2022-20927
11/09/20225.35.1Cisco FirePOWER Software for ASA SNMP hard-coded credentialsFirePOWER Software for ASA/FirePOWER Management Center/NGIPS SoftwareNot DefinedOfficial Fix0.03CVE-2022-20918
11/02/20225.05.0Fortinet FortiOS RSA SSH Host Key key managementFortiOSNot DefinedNot Defined0.06CVE-2022-30307
11/02/20226.26.2Fortinet FortiClient/FortiMail/FortiOS AV Engine data authenticityFortiClient/FortiMail/FortiOSNot DefinedNot Defined0.03CVE-2022-26122
11/02/20224.94.9Fortinet FortiOS API access controlFortiOSNot DefinedNot Defined0.03CVE-2022-38380
11/02/20225.05.0Fortinet FortiOS SSL-VPN LDAP/SAML information disclosureFortiOS SSL-VPNNot DefinedNot Defined0.06CVE-2022-35842
10/20/20223.73.6F5 BIG-IP SSL cleartext transmissionBIG-IPNot DefinedOfficial Fix0.03CVE-2022-41983
10/20/20227.57.5F5 BIG-IP Advanced WAF Attack Signature False Positive Mode denial of serviceBIG-IP Advanced WAFNot DefinedNot Defined0.03CVE-2022-41836
10/20/20227.57.3F5 BIG-IP TMM null pointer dereferenceBIG-IPNot DefinedOfficial Fix0.02CVE-2022-41787
10/20/20223.83.7F5 BIG-IP SSL Key Import denial of serviceBIG-IPNot DefinedOfficial Fix0.03CVE-2022-41694
10/20/20227.57.5F5 BIG-IP Advanced WAF/ASM Security Policy release of referenceBIG-IP Advanced WAF/ASMNot DefinedNot Defined0.03CVE-2022-41691

2601 more entries are not shown

Want to stay up to date on a daily basis?

Enable the mail alert feature now!