Home Security News Sophos Addresses Critical Firewall Vulnerability with Updated Patching Process and Urgent Recommendations for Organizations

Sophos Addresses Critical Firewall Vulnerability with Updated Patching Process and Urgent Recommendations for Organizations

Posted: December 14, 2023

woman in black shirt sitting beside black flat screen computer monitor

Sophos Patches EOL Firewall Vulnerability

Cybersecurity firm Sophos alerted the public about a recently patched vulnerability within Sophos Firewall that is currently being exploited in cyberattacks. This vulnerability directly affects the User Portal and Webadmin of Sophos Firewall. It is seen as an authentication bypass vulnerability, which, in turn, could lead to unauthorized remote code execution, thus posing significant security concerns.

Identification of New Exploit in Firewall Versions

The identified vulnerability, tagged as CVE-2022-1040 with a critical CVSS score of 9.8, impacts Sophos Firewall version v18.5 MR3 (18.5. and older) iterations. Sophos became aware of attackers exploiting this loophole to primarily target a small group of organizations based in South Asia. The company has since alerted each of these directly impacted organizations.

Description of the Security Defect as a Code Injection Issue

The vulnerability is characterized as an authentication bypass issue, allowing potential intruders to execute code remotely. An attacker exploiting this deficit could gain unauthorized access to the system, where they may alter, delete, or expose sensitive data. Remote code execution vulnerabilities are typically very serious, enabling cybercriminals to carry out extensive damage or gain unauthorized control over affected systems.

Immediate Action Taken by Sophos to Fix Certain EOL Versions

The company has promptly reacted by releasing patches for multiple supported Sophos Firewall versions and for a few versions that have already reached end-of-life (EOL) status, which is no longer under active support. The firm strongly advises customers to apply these patches immediately to protect themselves against these attacks. If patching is not feasible, customers are urged to secure their systems by ensuring restricted exposure of the User Portal and Webadmin to the WAN. Cybersecurity firm Sophos has a track record of promptly addressing vulnerabilities, an effort that holds significance in a time when cyber threats are rapidly evolving.

Updated Fix and Patching Process

After spotting fresh exploit attempts on Sophos Firewall systems, they promptly developed an upgraded fix to counter the highlighted vulnerabilities. The updated fix released considers the new exploits' specifics and is designed to effectively counter any potential threats arising from them. In this context, if the patch verification fails, indicating the hotfix isn't applied, Sophos has detailed the procedure to update the Firmware version, further safeguarding the systems against potential attacks.

Automatic Application of Patches to Affected Organizations

As part of its quick response to the vulnerability exploit, Sophos is deploying the necessary patches to affected organizations on an automatic basis. Affected organizations are recommended to apply the 'Fixed Version' patch to their SonicWall products. This automatic patch deployment streamlines the process of securing the systems, ensuring all potential vulnerabilities are catered to without undue delays.

Rollout of Hotfixes for Various Firewall Versions

Simultaneously, Sophos is rolling out hotfixes for various Firewall versions susceptible to the vulnerability. This comprehensive rollout targets currently supported versions and extends coverage to versions that have reached their End-Of-Life (EOL). The proactive release of hotfixes aims to secure as many systems as possible from exploitation, demonstrating Sophos' holistic approach to addressing cybersecurity threats.

Recommendations for Organizations

Given the ongoing cyber threats targeting firewall vulnerabilities, organizations are strongly advised to take swift action to secure their systems. Recommendations primarily urge the application of the 'Fixed Version' patch and upgrading Firewall firmware maintained by the affected organizations.

Advice on Updating to a Supported Version for Protection

One of the primary recommendations for organizations is to update their firewall systems to a supported version to ensure optimal protection. Particularly for businesses employing impacted firewalls, advice from leading cybersecurity platforms like Arctic Wolf stresses the importance of adhering to the available guidance by patching the vulnerabilities or implementing the suggested workarounds. System upgrades to a secured, supported version significantly reduce potential security risks associated with outdated software.

Urgent Call for Upgrading of Older Iterations of Products

There's also an urgent call for organizations to upgrade older versions of their products in light of the identified vulnerabilities. This pertains to not only SonicWall products, where the application of the 'Fixed Version' patch is strictly advised but also Sophos Firewall firmware, a product for which upgrading may be vital, contingent on the failure of the hotfix application. Sophos has also provided a detailed guide on firmware version updating to facilitate organizations in the upgrade process.

Emphasis on the Risk of Maintaining EOL Devices and Firmware

Aside from the urgency to patch vulnerabilities and upgrade software, there's a continuous emphasis on the associated risk of maintaining End-Of-Life (EOL) devices and firmware. Despite providing patches for a few EOL versions, these versions are no longer actively supported and may, ,expose organizations to potential cyber threats. Transitioning to supported versions of products is recommended to ensure fortified security and proactive support response to future vulnerabilities.

No Detailed Information Shared on The Recently Observed Attacks

Despite the evident concerns raised by this active exploitation of the firewall vulnerability, no detailed information regarding these current attacks has been reported yet. The nature of the attacks, the identity of the threat actors, and whether the exploit was used before or after the issuing of the hotfixes remain undisclosed at the time. Further updates from Sophos will be essential in understanding the extent and impact of this ongoing security threat.

Loading...