Sophos fixes Triple Critical Vulnerabilities in its Firewall

Sophos fixes Triple Critical Vulnerabilities in its Firewall


Sophos released patches for three critical security vulnerabilities in their widely-used network security tool, Sophos Firewall that posed significant risks, including remote code execution and privilege escalation.

CVE-2024-12727: Pre-Authentication SQL Injection

This vulnerability with a CVSS score of 9.8 involves the email protection feature of Sophos Firewall. If a specific configuration of Secure PDF eXchange (SPX) was enabled and the firewall was operating in High Availability (HA) mode, an attacker could exploit this vulnerability to access the reporting database. This could lead to remote code execution, allowing the attacker to take control of the affected system.

Advertisements

CVE-2024-12728: SSH Login Passphrase Reuse

This vulnerability with a CVSS score of 9.8 stemmed from the reuse of a non-random SSH login passphrase during the initialization of an HA cluster. If SSH was enabled, this vulnerability could expose a privileged system account, potentially giving attackers elevated access to the system.

CVE-2024-12729: Post-Authentication Code Injection

This vulnerability with a CVSS score of 8.8 is a post-authentication bug that affected the User Portal. Authenticated users could exploit this flaw to inject and execute arbitrary code, potentially compromising the security of the system and allowing further malicious activities.

Advertisements

Resolution and Recommendations

Sophos has released hotfixes to address these vulnerabilities. Users are strongly advised to update their Sophos Firewall devices to the latest versions to protect against these security risks. Ensuring that the firewall is up-to-date is crucial for maintaining the integrity and security of the network.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.