CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
52.3%
The webservices in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows for an anonymous user to execute remote code through ‘eval injection’. Exploitation requires network access to the webservices API, but such access is a non-standard configuration. This affects all versions 8.20.0 and below.
Vendor | Product | Version | CPE |
---|---|---|---|
proofpoint | enterprise_protection | * | cpe:2.3:a:proofpoint:enterprise_protection:*:*:*:*:*:*:*:* |
proofpoint | enterprise_protection | 8.18.6 | cpe:2.3:a:proofpoint:enterprise_protection:8.18.6:*:*:*:*:*:*:* |
proofpoint | enterprise_protection | 8.20.0 | cpe:2.3:a:proofpoint:enterprise_protection:8.20.0:*:*:*:*:*:*:* |
[
{
"defaultStatus": "unaffected",
"product": "enterprise_protection",
"vendor": "proofpoint",
"versions": [
{
"changes": [
{
"at": "8.20.0 patch 4570",
"status": "unaffected"
},
{
"at": "8.18.6 patch 4568",
"status": "unaffected"
},
{
"at": "8.18.4 patch 4567",
"status": "unaffected"
},
{
"at": "8.13.22 patch 4566",
"status": "unaffected"
}
],
"lessThanOrEqual": "8.20.0",
"status": "affected",
"version": "8.*",
"versionType": "semver"
}
]
}
]