Sophos Release Patch for Seven "Sophos Firewall" CVE's - 20221208003¶
Overview¶
Sophos has released a security advisory and patch addressing seven vulnerabilities including a 'critical' Remote Code Execution (RCE) vulnerability previously remediated via a hotfix and three rated 'High'.
What is the vulnerability ?¶
CVE-2022-3236: CVSS 9.8 - A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to conduct RCE in Sophos Firewall. This CVE was subject to a previous advisory and hotfix, which has now officially been rolled out in a new patch.
CVE-2022-3713: CVSS 8.8 - A code injection vulnerability that can allow an adjacent attacker to execute code in the Wi-Fi controller of Sophos Firewall.
CVE-2022-3709: CVSS 8.4 - A stored XSS vulnerability allows an administrator to super-administrator privilege escalation in the Webadmin import group wizard of Sophos Firewall.
CVE-2022-3696: CVSS 7.2 - A post-authentication code injection vulnerability that allows administrators to execute code in Webadmin of Sophos Firewall.
CVE-2022-3226: CVSS 7.2 - An OS command injection vulnerability allows admins to execute code via SSL VPN configuration uploads in Sophos Firewall.
CVE-2022-3711: CVSS 4.3 - A post-auth read-only SQL injection vulnerability allows users to read non-sensitive configuration database contents in the User Portal of Sophos Firewall.
What is vulnerable ?¶
All versions of Sophos Firewall prior to v19.5 GA are considered vulnerable.
What has been observed ?¶
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
- Review the Sophos Advisory.
- Ascertain if your version of Sophos Firewall is vulnerable.
- If vulnerable, patch immediately to avoid exploitation.