{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T12:02:40.750","vulnerabilities":[{"cve":{"id":"CVE-2022-0652","sourceIdentifier":"security-alert@sophos.com","published":"2022-03-22T00:15:08.327","lastModified":"2024-11-21T06:39:06.880","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Confd log files contain local users', including root’s, SHA512crypt password hashes with insecure access permissions. This allows a local attacker to attempt off-line brute-force attacks against these password hashes in Sophos UTM before version 9.710."},{"lang":"es","value":"Los archivos de registro de Confd contienen hashes de contraseñas SHA512crypt de usuarios locales, incluido el root, con permisos de acceso no seguros. Esto permite a un atacante local intentar ataques de fuerza bruta fuera de línea contra estos hashes de contraseñas en Sophos UTM versiones anteriores a 9.710"}],"metrics":{"cvssMetricV31":[{"source":"security-alert@sophos.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-532"},{"lang":"en","value":"CWE-732"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sophos:unified_threat_management:*:*:*:*:*:*:*:*","versionEndExcluding":"9.710","matchCriteriaId":"1930A0C8-5884-42E6-856D-F66B137FEEB5"}]}]}],"references":[{"url":"https://www.sophos.com/en-us/security-advisories/sophos-sa-20220321-utm-9710","source":"security-alert@sophos.com","tags":["Vendor Advisory"]},{"url":"https://www.sophos.com/en-us/security-advisories/sophos-sa-20220321-utm-9710","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}