Sophos Releases Hotfixes for Critical Firewall Vulnerabilities

Need some ammo against Sophos? Discover how vulnerabilities in their Firewall products could expose businesses and highlight the importance of comprehensive security solutions.

 

Sophos has released hotfixes for three vulnerabilities in its Firewall products, two of which are critical, that could allow remote code execution and privileged access. While there is no evidence of these being exploited, they impact versions 21.0 GA and older. Users are advised to update to the latest versions to mitigate these risks. Temporary workarounds include restricting SSH access and reconfiguring HA settings. The update follows recent charges against a Chinese national for exploiting a different Sophos Firewall vulnerability.

 

Key Facts

Risks:

Patch Management, Weak or Compromised Credentials, Web App/Website Vulnerability

Keywords:

Sophos Firewall, CVE-2024-12727, CVE-2024-12728, CVE-2024-12729, Remote Code Execution, Vulnerability Patch

CVE:

CVE-2024-12727; CVE-2024-12728; CVE-2024-12729; CVE-2020-12271

Affected:

Sophos Firewall

 

Article Body

Sophos Releases Critical Hotfixes for Firewall Vulnerabilities

Sophos has addressed three security vulnerabilities in its Firewall products by releasing essential hotfixes. These vulnerabilities posed significant risks, potentially allowing attackers to execute code remotely and gain privileged access to systems.

Identified Vulnerabilities

The three vulnerabilities include:

Impact and Affected Versions

Sophos reports that CVE-2024-12727 impacts about 0.05% of devices, while CVE-2024-12728 affects around 0.5%. All three vulnerabilities are present in Sophos Firewall versions 21.0 GA (21.0.0) and older.

Remediation

Sophos has issued hotfixes for these vulnerabilities, with updates available for the following versions:

Verification Steps

To ensure the hotfixes are applied, users should:

Temporary Workarounds

Until patches can be fully applied, Sophos advises restricting SSH access to a dedicated HA link, using a long, random passphrase for HA configurations, and disabling WAN access via SSH. Additionally, ensure that User Portal and Webadmin are not exposed to WAN.

These updates come shortly after the U.S. government's charges against a Chinese national for exploiting a previous zero-day vulnerability in Sophos firewalls, highlighting the ongoing need for vigilance and timely patching in cybersecurity.

 

Read More

https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html?m=1