Sophos has fixed an XML External Entity (XEE/XXE) vulnerability allowing for Server-Side Request Forgery (SSRF) and potential code execution in Sophos Mobile managed on-premises. This was discovered and responsibly disclosed to Sophos by an external security researcher.
Sophos would like to thank Florian Hauser of Code White GmbH for responsibly disclosing the issue to Sophos.
No action is required for customers using Sophos Mobile, managed by Sophos Central.
Applies to the following Sophos product(s) and version(s)
Sophos Mobile managed on-premises between version 5.0.0 and 9.7.4
Customers can protect themselves by blocking all requests to
/servlets/OmaDsServlet on a WAF.
Ensure you are running the supported version (9.7.3) of Sophos Mobile managed on-premises
Install the Sophos Mobile 9.7.5 patch
For customers unable to upgrade to version 9.7.5, apply the hotfix (tested on 7.0.0 and newer):
Download the Sophos Mobile November 2022 hotfix
SophosMobileHotfixNov2022.ps1and select “Run as administrator” on the server
Users of older versions of Sophos Mobile on-premises are required to upgrade to receive this fix