Description

Sophos has recently addressed three critical vulnerabilities in its Sophos Firewall product, which could allow remote attackers to perform SQL injection, remote code execution, and gain privileged SSH access to devices. The vulnerabilities, tracked as CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729, affect Sophos Firewall version 21.0 GA (21.0.0) and older. Fortunately, the company has already released hotfixes and permanent fixes through new firmware updates to mitigate these risks. The vulnerabilities are particularly concerning, as they could allow attackers to access sensitive data, execute arbitrary code, and gain unauthorized access to systems. CVE-2024-12727, for instance, is a pre-authentication SQL injection vulnerability that can be exploited if a specific configuration of Secure PDF eXchange (SPX) is enabled in combination with High Availability (HA) mode. Meanwhile, CVE-2024-12728 leaves systems vulnerable to unauthorized access due to predictable credentials, and CVE-2024-12729 allows attackers with valid credentials to execute arbitrary code remotely. Sophos has released hotfixes and permanent fixes for these vulnerabilities, which are installed by default. The company has also provided workarounds for mitigating risks associated with CVE-2024-12728 and CVE-2024-12729. To protect against these vulnerabilities, admins are advised to limit SSH access, disable SSH over the WAN interface, and ensure that the User Portal and Webadmin interfaces are not exposed to the WAN. By taking these steps, organizations can reduce their risk of falling victim to these critical vulnerabilities and protect their sensitive data and systems.