Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 31 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cato Networks’ Socket versions prior to 25 contain a command injection vulnerability that allows an authenticated attacker with access to the Socket web interface (UI) to execute arbitrary operating system commands as the root user on the Socket’s internal system. | |
| Title | Cato's Socket WebUI is vulnerable to OS Command Injection | |
| Weaknesses | CWE-20 CWE-78 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Cato
Published:
Updated: 2026-03-31T13:21:59.364Z
Reserved: 2025-12-07T13:44:13.332Z
Link: CVE-2025-14213
Updated: 2026-03-31T13:21:54.256Z
Status : Received
Published: 2026-03-31T12:16:26.813
Modified: 2026-03-31T12:16:26.813
Link: CVE-2025-14213
No data.
OpenCVE Enrichment
No data.