Critical
Sophos Firewall v19.0 GA Resolves Security Vulnerabilities (CVE-2022-1040, CVE-2021-25268, CVE-2021-25267, CVE-2022-0331)
CVE(N)
CVE-2022-1040
CVE-2021-25268
CVE-2021-25267
CVE-2022-0331
产品(N)
Sophos Firewall
更新日
2022 May 5
文章版本
1
公開日
2022 May 5
公開 ID
sophos-sa-20220505-sfos-19-0-0
回避策
No
Overview
The Sophos Firewall v19.0 GA (19.0.0) release fixes the following security issues (users of older versions are required to upgrade.)
CVE ID | Description | Severity |
|---|---|---|
CVE-2022-1040 | An authentication bypass vulnerability allowing remote code execution was discovered in the User Portal and Webadmin of Sophos Firewall and responsibly disclosed to Sophos by an external security researcher. It was reported via the Sophos bug bounty program. Hotfixes for this issue have been released. See https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce for details. | CRITICAL |
CVE-2021-25268 | Multiple XSS vulnerabilities allowing for privilege escalation from MySophos admin to SFOS admin in Webadmin of Sophos Firewall were discovered and responsibly disclosed to Sophos by external security researchers. They were reported via the Sophos bug bounty program. Sophos would like to thank Gaetano Sapia for responsibly disclosing one of these issues to Sophos. | HIGH |
CVE-2021-25267 | Multiple XSS vulnerabilities allowing for privilege escalation from admin to super-admin in Webadmin of Sophos Firewall were discovered and responsibly disclosed to Sophos by external security researchers. They were reported via the Sophos bug bounty program. Sophos would like to thank Gaetano Sapia for responsibly disclosing several of these issues to Sophos. | MEDIUM |
CVE-2022-0331 | An information disclosure vulnerability allowing the device serial number to be read by an unauthenticated user in Webadmin of Sophos Firewall was discovered and responsibly disclosed to Sophos by an external security researcher. It was reported via the Sophos bug bounty program. Sophos would like to thank Mohammed Adel of Safe Decision Cybersecurity Labs for responsibly disclosing the issue to Sophos. | MEDIUM |
Notes
Users of older versions of Sophos Firewall are required to upgrade to receive these fixes
Sophos always recommends that Sophos Firewall customers upgrade to the latest available release at their earliest opportunity
Related information
https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0331
Sophos Responsible Disclosure Policy
To learn about Sophos security vulnerability disclosure policies and publications, see the Responsible Disclosure Policy.