NewsSecurity Vulnerabilities

Sophos Firewall v19.5 GA resolves a number of security vulnerabilities

The Sophos Firewall v19.5 GA (19.5.0) release fixes a number of security issues (users of older versions are required to upgrade.)

Sophos always recommends that Sophos Firewall customers upgrade to the latest available release at their earliest opportunity

Further information – https://community.sophos.com/sophos-xg-firewall/b/blog/posts/sophos-firewall-v195-is-now-available

CVE-2022-3236 – CRITICAL

A code injection vulnerability allowing remote code execution was discovered in the User Portal and Webadmin.

Hotfixes for this issue have been released. See https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce for details.

CVE-2022-3226 – HIGH

An OS command injection vulnerability allowing admins to execute code via SSL VPN configuration uploads was discovered by Sophos during internal security testing.

CVE-2022-3713 – HIGH

A code injection vulnerability allowing adjacent attackers to execute code in the Wifi controller was discovered by Sophos during internal security testing. It requires attackers to be connected to an interface with the Wireless Protection service enabled.

CVE-2022-3696 – HIGH

A post-auth code injection vulnerability allowing admins to execute code in Webadmin was discovered and responsibly disclosed to Sophos by an external security researcher. It was reported via the Sophos bug bounty program.

CVE-2022-3709 – MEDIUM

A stored XSS vulnerability allowing admin to super-admin privilege escalation in the Webadmin import group wizard was discovered and responsibly disclosed to Sophos by an external security researcher. It was reported via the Sophos bug bounty program.

CVE-2022-3711 – MEDIUM

A post-auth read-only SQL injection vulnerability allowing users to read non-sensitive configuration database contents in the User Portal was discovered and responsibly disclosed to Sophos by an external security researcher. It was reported via the Sophos bug bounty program.

CVE-2022-3710 – LOW

A post-auth read-only SQL injection vulnerability allowing API clients to read non-sensitive configuration database contents in the API controller was discovered and responsibly disclosed to Sophos by an external security researcher. It was reported via the Sophos bug bounty program. Sophos would like to thank Erik de Jong for responsibly disclosing this issue to Sophos.

Luke Simmonds

Blogger at www.systemtek.co.uk

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.