QID 730598

QID 730598: Sophos SG UTM Remote Code Execution (RCE) Vulnerability (sophos-sa-20200918-sg-webadmin-rce)

Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple point solutions.

CVE-2020-25223: A remote code execution vulnerability in the WebAdmin of SG UTM was discovered and responsibly disclosed to Sophos in 2020.

Affected Versions:
Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable Apache Shiro by sending a specially crafted payload for command execution or make a query that will trigger Qualys Periscope detection mechanism.

Successful exploitation of this vulnerability may allow an unauthenticated attacker to execute arbitrary code on the target system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution

    Vendor has released patch, for more info please refer to sophos-sa-20200918-sg-webadmin-rce

    Workaround:
    Customers can protect themselves by ensuring their WebAdmin is not exposed to WAN.

    This can be achieved by keeping Internal (LAN) (Network) or another internal-only network definition as the sole entry in Management->WebAdmin Settings->WebAdmin Access Configuration->Allowed Networks.

    Vendor References

    CVEs related to QID 730598

    Software Advisories
    Advisory ID Software Component Link
    sophos-sa-20200918-sg-webadmin-rce URL Logo www.sophos.com/en-us/security-advisories/sophos-sa-20200918-sg-webadmin-rce