Endpoint/Device Security

Sophos addresses Firewall code execution flaws

SecurityWeek reports that Sophos has fixed seven code execution vulnerabilities in Sophos Firewall as part of the version 19.5 update. Most severe of the patched flaws was CVE-2022-3236, which was initially noted by Sophos in September to have been leveraged in cyberattacks aimed at mostly South Asian organizations. Sophos has also remediated the high severity OS command injection bug, tracked as CVE-2022-3226, which could be abused for code execution through SSL VPN configuration uploads by attackers with admin privileges, as well as the high severity CVE-2022-3713 and CVE-2022-3696 flaws, which could be exploited for code execution in the Wi-Fi controller and malicious code execution in the web-based admin interface, respectively. Meanwhile, medium and low severity bugs comprised the other flaws addressed by Sophos, including two SQL injection flaws that could facilitate sensitive configuration database content leaks, and a stored XSS vulnerability that could be exploited to allow privilege escalation.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.