← Back
CVE-2017-6412 high CVSS 8.1

In Sophos Web Appliance (SWA) before 4.3.1.2, Session Fixation could occur, aka NSWA-1310.

Summary

In Sophos Web Appliance (SWA) before 4.3.1.2, Session Fixation could occur, aka NSWA-1310.

AI summary snake-internal / snake-template-v1

A weakness called CVE-2017-6412 was discovered in Sophos Web Appliance. Severity is High (CVSS 8.1/10). If exploited, attackers can leak data or disrupt key functionality. What you should do: update the affected software to the latest version. If unsure, ask your IT team or search the vendor's site for "Sophos CVE-2017-6412".
CVE-2017-6412 (Sophos Web Appliance). Severity: High / CVSSv3 8.1. Category: CWE-384. Response plan: 1. Check the vendor advisory for affected versions and the patched release. 2. If a vulnerable version is running in production, schedule maintenance (urgency from KEV/CVSS). 3. If no patch yet, mitigate via WAF rule, disabling the affected feature, etc. 4. Monitor logs / SIEM for known IOC and PoC signatures of this CVE. PoCs and fix commits: see the 'References' section, MITRE, and NVD.
❓ What is the problem
A weakness (CVE-2017-6412) in Sophos Web Appliance. A serious software flaw has been identified.
📍 Affected scope
Target versions of Sophos Web Appliance (see vendor advisory). If running in production, identify exposure immediately.
🔥 Severity
Severity: High (CVSS 8.1/10). If exploited, attackers can leak data or disrupt key functionality.
🔧 How to fix
Update to the patched release as listed in the vendor advisory. (Typical mitigation pattern for CWE-384)
🛡️ Workaround
If a patch is not yet available, consider disabling the affected feature, applying WAF rules, blocking via network ACLs, or isolating the vulnerable version.
🔍 Detection
Check version information, scan dependencies via SBOM, and monitor SIEM for IOC and PoC signatures related to this CVE.

References

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →