If you believe you have identified a security concern with Appgate SDP please contact appgate-security@appgate.com

TitleIDSeverityProducts EffectedFirst PublishedLast Published
Privilege Escalation on Appgate SDP Client for Windows PDF2020-04-01High (CVSS 7.8)Appgate SDP full Clients for Windows versions prior to 5.1.12020-05-012020-05-01
Remote code execution on management interface PDFPDF2020-04-02High (CVSS 7.5)Appgate SDP Controller versions 4.1.0 through 5.0.3, 5.1.0 and 5.1.12020-05-012020-05-01
Scripting Engine Sandbox BypassPDF2019-11-0001High (CVSS 7.2)Appgate SDP Appliances before v5.0.22019-11-182019-11-18
Remote Privilege Escalation on Windows ClientPDF2019-07-0001High (CVSS 8.0)Appgate SDP Client for Windows from v4.1.0 to v4.3.12019-07-09 2019-07-09
Controller Impersonation during Appliance CommunicationPDF2018-12-0001Low (CVSS 3.3)Appgate SDP Appliances before v4.1.72018-12-032018-12-03
Privilege Escalation on Windows ClientPDF2018-11-0001LowAppgate SDP Client for Windows from v4.1.0 to v4.1.22018-11-222018-11-22
TCP Stack vulnerability: SegmentSmackPDF2018-08-0001LowAppgate SDP before v4.1.22018-08-092018-08-09
Information Disclosure on Management InterfacePDF2018-07-0001LowAppgate SDP from v4.0.0 to v4.0.32018-07-122018-07-12
SAML Authentication BypassPDF2018-03-0001LowAppgate SDP before v3.3.32018-03-122018-03-12
CPU vulnerability: Meltdown and SpectrePDF2018-01-001LowAppgate SDP before v3.3.3 AppGate Classic all versions2018-01-082018-01-08
Shell access and information disclosurePDF2017-06-0001MediumAppgate Classic before v11.2.72017-06-082017-06-08
Information Disclosure on Management InterfacePDF2017-05-0001HighAppgate SDP Controller before v3.1.2 2017-05-182018-07-12

Appgate Security Advisories and other Appgate security content are provided on an "as is" basis and do not imply any kind of guarantee or warranty. Your use of the information in these publications or linked material is at your own risk. Appgate reserves the right to change or update this content without notice at any time.