Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

Multiple Code Execution Vulnerabilities Patched in Sophos Firewall

Issued: 
Sunday, 11 December, 2022
Last Revision: 
Sunday, 11 December, 2022
Vendor: 
Product: 
Severity Level: 
Summary: 

A code injection vulnerability allowing remote code execution discovered in the User Portal and Webadmin of Sophos Firewall. The vulnerability has been fixed. No action is required for Sophos Firewall customers with the "Allow automatic installation of hotfixes" feature enabled on remediated versions.

 

Sophos has observed this vulnerability being used in the wild. Three of the vulnerabilities patched in Sophos Firewall 19.5 have a ‘high’ severity rating, including CVE-2022-3226, an OS command injection issue that can be exploited by an attacker with admin privileges to execute code via SSL VPN configuration uploads.

 

CVE-2022-3713 allows an adjacent attacker to execute code in the Wi-Fi controller. The third high-severity issue, CVE-2022-3696, allows a hacker with admin privileges to execute malicious code in the web-based administrative interface. The remaining three vulnerabilities have medium or low severity.

 

Successful compromise of these vulnerabilities my impacting data loss, service disruption, development of ransomware or other malware and lateral movement of the attacker.

 

CVE/Vulnerability

Affected Products

CVSS Score

Exploitable

CVE-2022-3236

Sophos Firewall v19.0 MRI (19.0.1) & Older

9.8

Yes

CVE-2022-3226

7.2

No

CVE-2022-3713

8.8

No

CVE-2022-3696

7.2

No

CVE-2022-3709

8.4

No

CVE-2022-3236

9.8

No

 

 

Recommendation: 

Organizations using older version are required to upgrade  the latest version of Sophos Firewall at their earliest.