Inhalte springen
Informational

Critical

Sophos Web Appliance 4.3.10.4 Resolves Security Vulnerabilities

CVE(N)

CVE-2023-1671

CVE-2022-4934

CVE-2020-36692

PRODUKT(E)

Sophos Web Appliance (SWA)

Aktualisiert

2023 Nov 17

Artikelversion

2

Erstellt

2023 Apr 4

Veröffentlichungs-ID

sophos-sa-20230404-swa-rce

Workaround

No

Overview

The Sophos Web Appliance (SWA) 4.3.10.4 release fixes the following security issues:

CVE IDDescriptionSeverity
CVE-2023-1671A pre-auth command injection vulnerability in the warn-proceed handler allowing execution of arbitrary code was discovered and responsibly disclosed to Sophos by an external security researcher via the Sophos bug bounty program.

CISA observed this vulnerability being used in the wild.
CRITICAL
CVE-2022-4934A post-auth command injection vulnerability in the exception wizard allowing administrators to execute arbitrary code was discovered and responsibly disclosed to Sophos by an external security researcher via the Sophos bug bounty program.HIGH
CVE-2020-36692A reflected XSS via POST vulnerability in report scheduler allowing execution of JavaScript code in the victim browser was discovered and responsibly disclosed to Sophos by an external researcher via the Sophos bug bounty program. The victim must be tricked into submitting a malicious form on an attacker-controlled website while logged in to SWA for the attack to succeed.MEDIUM

Notes

  • End of Life date for Sophos Web Appliance is on July 20, 2023
  • Sophos recommends that Sophos Web Appliance is protected by a firewall and not accessible via the public Internet
  • There is no action required for Sophos Web Appliance customers, as updates are installed automatically by default
Sophos Logo

Sophos Responsible Disclosure Policy

To learn about Sophos security vulnerability disclosure policies and publications, see the Responsible Disclosure Policy.