| CVE ID | CVE-2014-5502 | 
| CVSS SCORE | 9.0, AV:N/AC:L/Au:S/C:C/I:C/A:C | 
| AFFECTED VENDORS | Sophos | 
| AFFECTED PRODUCTS | Cyberoam | 
| TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['16273']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com | 
| VULNERABILITY DETAILS | 
 The specific flaw exists within the webclient_portal_settings opcode.  The issue lies in the failure to properly sanitize user-supplied input before executing commands.  An attacker can leverage this vulnerability to execute code under the context of the current process. | 
| ADDITIONAL DETAILS | Sophos has issued an update to correct this vulnerability. More details can be found at: http://kb.cyberoam.com/default.asp?id=3049&Lang=1&SID | 
| DISCLOSURE TIMELINE | 
 | 
| CREDIT | agix |