CVE-2014-9610
high-risk
Published 2017-09-19
Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and remove IP addresses from the quarantine via the ip parameter to webadmin/user/quarantine_disable.php.
Do I need to act?
!
13.4% chance of exploitation in next 30 days
EPSS score — higher than 87% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (12)
Affected Vendors
References (4)
Third Party Advisory
http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQ...
Third Party Advisory
https://www.exploit-db.com/exploits/37929/
Third Party Advisory
http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQ...
Third Party Advisory
https://www.exploit-db.com/exploits/37929/
50
/ 100
high-risk
Severity
21/34 · High
Exploitability
12/34 · Low
Exposure
17/34 · Moderate