• NL
  • FR
  • DE
  • EN
www.belgium.be Logo of the federal government

0-DAY SQL injection vulnerability in SOPHOS XG FIREWALL/SFOS

Reference: 
Advisory #2020-014
Version: 
1
Affected software: 
Sophos XG Firewall [SFOS] 17.0
Sophos XG Firewall [SFOS] 17.1
Sophos XG Firewall [SFOS] 17.5
Sophos XG Firewall [SFOS] 18.0
Type: 
Remote Code Execution [RCE]

Sources

Risks

Successful exploitation of this vulnerability may allow an attacker to execute code remotely on the affected versions of the Sophos XG Firewall.
Attackers are actively exploiting this vulnerability and can leverage the vulnerability to download a payload or use it to exfiltrate data like usernames and hashed passwords. 

Description

The zero-day vulnerability was disclosed on April 22, 2020, and is actively exploited by attackers.
Attackers are targeting XG Firewall devices’ configuration with a publicly available administration interface (HTTPS service) or user portal via the internet.
The flaw exists due to an SQL injection bug in the XG enterprise firewall product on both physical and virtual firewalls.

The UK-based company Sophos, has already pushed an automatic update to patch all XG Firewalls that have the auto-update feature enabled.

For more information regarding how this vulnerability is exploited please refer to:

 

Recommended Actions

CERT.be recommends applying the updates released by the vendor if your configuration didn’t apply the patches automatically. CERT.be recommends limiting publicly accessible administration and configuration tools to an absolute minimum.

It is recommended to apply the following steps even if the devices were patched:

References