QID 730616

Date Published: 2022-09-27

QID 730616: Sophos Firewall Remote Code Execution (RCE) Vulnerability (sophos-sa-20220923-sfos-rce)

A code injection vulnerability allowing remote code execution was discovered in the User Portal and Webadmin of Sophos Firewall.

Affected Versions:
Sophos Firewall v19.0 MR1 (19.0.1) and older

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable version of Sophos Firewall by extracting the version from themes/lite1/css/common_min.css

Note: Sophos has released hotfix for older versions of firewall. It is not possible to check the hotfix version remotely, hence the detection is kept as potential check.

Successful exploitation of the vulnerability may allow Remote Code Execution.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution

    Vendor has released v18.5 MR5 (18.5.5), v19.0 MR2 (19.0.2), and v19.5 GA as fix, for more info please refer to sophos-sa-20220923-sfos-rce

    Workaround:
    Customers can protect themselves from external attackers by ensuring their User Portal, and Webadmin are not exposed to WAN.
    Disable WAN access to the User Portal and Webadmin by following device access best practices and instead use VPN and/or Sophos Central (preferred) for remote access and management.

    Vendor References

    CVEs related to QID 730616

    Software Advisories
    Advisory ID Software Component Link
    sophos-sa-20220923-sfos-rce URL Logo www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce