Severe Sophos Firewall Vulnerabilities Allow Remote Code Execution by Attackers

By|
Admin
|
2024-12-21
|
Vulnerabilities

Sophos has disclosed three critical security vulnerabilities in its Sophos Firewall product that could enable attackers to execute remote code on affected systems. Identified as CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729, these flaws pose significant risks to organizations relying on Sophos Firewall for network protection.
 

Vulnerability Details:

  1. CVE-2024-12727:
    A pre-authentication SQL injection vulnerability in the email protection feature of the Sophos Firewall could allow attackers to access the reporting database and execute remote code. This issue is especially critical when the Secure PDF Exchange (SPX) feature is enabled, and the firewall operates in High Availability (HA) mode. Affecting only 0.05% of devices, it was responsibly disclosed via Sophos’s bug bounty program.
     

  2. CVE-2024-12728:
    This vulnerability stems from reusing a non-random SSH login passphrase after the HA setup process. If SSH is enabled, attackers could exploit privileged system accounts. Approximately 0.5% of devices are impacted, and Sophos discovered this during internal security testing.
     

  3. CVE-2024-12729:
    A post-authentication code injection vulnerability in the User Portal enables authenticated users to execute arbitrary code. An external researcher disclosed this issue responsibly.


Mitigation and Fixes:

Sophos has issued automatic hotfixes for devices with the "Allow automatic installation of hotfixes" feature enabled. Manual updates are required for other setups. Fixes are included in Sophos Firewall v21 MR1 and newer.
 

  • CVE-2024-12727: Hotfixes released on December 17, 2024.
  • CVE-2024-12728: Hotfixes issued on November 26 and 27, 2024.
  • CVE-2024-12729: Hotfixes provided on December 4, 5, and 10, 2024.

 

Interim Workarounds:

For organizations unable to apply updates immediately, Sophos recommends:

  • CVE-2024-12728: Restrict SSH access to dedicated HA links and configure random, strong passphrases for HA setups.
  • CVE-2024-12729: Disable WAN access to the User Portal and WebAdmin interfaces, relying on VPN or Sophos Central for remote management.

 

Although no exploits have been detected in the wild, Sophos stresses the urgency of applying updates and following mitigations to safeguard against potential attacks.

Organizations should promptly ensure their Sophos Firewall is updated to protect against these vulnerabilities.