7 security vulnerabilities in Sophos Firewall version < 19.5.0. Patch immediately

Customers have been alerted by Sophos that many vulnerabilities, including ones that may lead to arbitrary code execution, have been patched in Sophos Firewall version 19.5. Some of these security flaws were uncovered in-house by Sophos, while others were brought to the attention of the business by third-party researchers who participated in the bug bounty program.

It is not unusual for threat actors to exploit vulnerabilities in Sophos products, and they have a wide variety of targets to pick from as a result of the large number of internet-connected appliances that are now in circulation.

Chinese threat actors have been connected to at least some of the cyberattacks that targeted Sophos products.

The following vulnerabilities have been patched in the Sophos Firewall version 19.5 GA (19.5.0) release: (users of older versions are required to upgrade.)

CVE-2022-3236

It was revealed that the User Portal and the Webadmin both had a code injection vulnerability that might lead to remote code execution.

Severity: Critical

CVE-2022-3226

During the course of Sophos’s internal security testing, an OS command injection vulnerability that enabled administrators to run malware over SSL VPN configuration uploads was identified by the company.

Severity: HIGH

CVE-2022-3713

During the course of Sophos’ internal security testing, a code injection vulnerability that may potentially be exploited by nearby attackers to gain execution privileges in the Wifi controller was uncovered. In order for this to work, attackers need to be connected to an interface that has the Wireless Protection service turned on.

Severity:HIGH

CVE-2022-3696

An external security researcher uncovered a post-auth code injection vulnerability in Webadmin that allowed administrators to execute code. This vulnerability was appropriately revealed to Sophos by the researcher. The vulnerability was discovered via the Sophos bug bounty program.

Severity:HIGH

CVE-2022-3709

An external security researcher made the discovery of a cached XSS vulnerability in the Webadmin import group wizard that allowed for privilege escalation from admin to super-admin. This vulnerability was appropriately notified to Sophos by the researcher. The vulnerability was discovered via the Sophos bug bounty program.

Severity:MEDIUM

CVE-2022-3711

An external security researcher found a post-auth read-only SQL injection vulnerability in the User Portal that allowed users to access non-sensitive configuration database contents. The researcher then responsibly revealed the issue to Sophos so that the company could address it. The vulnerability was discovered via the Sophos bug bounty program.

Severity:MEDIUM

CVE-2022-3710

An independent security researcher uncovered a post-auth read-only SQL injection vulnerability in the API controller that allowed API clients to view non-sensitive configuration database contents. This issue was properly revealed to Sophos by the independent security researcher. The vulnerability was discovered via the Sophos bug bounty program.

Severity:LOW