QID 730598
QID 730598: Sophos SG UTM Remote Code Execution (RCE) Vulnerability (sophos-sa-20200918-sg-webadmin-rce)
Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple point solutions.
CVE-2020-25223: A remote code execution vulnerability in the WebAdmin of SG UTM was discovered and responsibly disclosed to Sophos in 2020.
Affected Versions:
Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11
QID Detection Logic (Unauthenticated):
This QID checks for vulnerable Apache Shiro by sending a specially crafted payload for command execution or make a query that will trigger Qualys Periscope detection mechanism.
Successful exploitation of this vulnerability may allow an unauthenticated attacker to execute arbitrary code on the target system.
Vendor has released patch, for more info please refer to sophos-sa-20200918-sg-webadmin-rce
Workaround:Customers can protect themselves by ensuring their WebAdmin is not exposed to WAN.
This can be achieved by keeping Internal (LAN) (Network) or another internal-only network definition as the sole entry in Management->WebAdmin Settings->WebAdmin Access Configuration->Allowed Networks.
- sophos-sa-20200918-sg-webadmin-rce -
www.sophos.com/en-us/security-advisories/sophos-sa-20200918-sg-webadmin-rce
CVEs related to QID 730598
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| sophos-sa-20200918-sg-webadmin-rce |
|