Vai al contenuto
Informational

Critical

Sophos Firewall v19.0 GA Resolves Security Vulnerabilities (CVE-2022-1040, CVE-2021-25268, CVE-2021-25267, CVE-2022-0331)

CVE(N)

CVE-2022-1040

CVE-2021-25268

CVE-2021-25267

CVE-2022-0331

PRODOTTO(I)

Sophos Firewall

Aggiornato

2022 May 5

Versione articolo

1

Pubblicato

2022 May 5

ID pubblicazione

sophos-sa-20220505-sfos-19-0-0

Soluzione alternativa

No

Overview

The Sophos Firewall v19.0 GA (19.0.0) release fixes the following security issues (users of older versions are required to upgrade.)

CVE ID

Description

Severity

CVE-2022-1040

An authentication bypass vulnerability allowing remote code execution was discovered in the User Portal and Webadmin of Sophos Firewall and responsibly disclosed to Sophos by an external security researcher. It was reported via the Sophos bug bounty program.

Hotfixes for this issue have been released. See https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce for details.

CRITICAL

CVE-2021-25268

Multiple XSS vulnerabilities allowing for privilege escalation from MySophos admin to SFOS admin in Webadmin of Sophos Firewall were discovered and responsibly disclosed to Sophos by external security researchers. They were reported via the Sophos bug bounty program.

Sophos would like to thank Gaetano Sapia for responsibly disclosing one of these issues to Sophos.

HIGH

CVE-2021-25267

Multiple XSS vulnerabilities allowing for privilege escalation from admin to super-admin in Webadmin of Sophos Firewall were discovered and responsibly disclosed to Sophos by external security researchers. They were reported via the Sophos bug bounty program.

Sophos would like to thank Gaetano Sapia for responsibly disclosing several of these issues to Sophos.

MEDIUM

CVE-2022-0331

An information disclosure vulnerability allowing the device serial number to be read by an unauthenticated user in Webadmin of Sophos Firewall was discovered and responsibly disclosed to Sophos by an external security researcher. It was reported via the Sophos bug bounty program.

Sophos would like to thank Mohammed Adel of Safe Decision Cybersecurity Labs for responsibly disclosing the issue to Sophos.

MEDIUM

Notes

  • Users of older versions of Sophos Firewall are required to upgrade to receive these fixes

  • Sophos always recommends that Sophos Firewall customers upgrade to the latest available release at their earliest opportunity

Related information

Sophos Logo

Sophos Responsible Disclosure Policy

To learn about Sophos security vulnerability disclosure policies and publications, see the Responsible Disclosure Policy.

Sophos Firewall v19.0 GA Resolves Security Vulnerabilities (CVE-2022-1040, CVE-2021-25268, CVE-2021-25267, CVE-2022-0331) | Sophos