Sophos had to
update old firewall firmware versions due to a security vulnerability (CVE-2022-3236) after attacked by hackers.
There is a code injection flaw in the User Portal and Webadmin of Sophos Firewall. This flaw allows for remote code execution.
By infosecbulletin
/ Monday , January 20 2025
Security researchers have found several vulnerabilities in Azure DevOps that could enable attackers to inject CRLF queries and carry out...
Read More
By infosecbulletin
/ Monday , January 20 2025
Intel Corporation is a leading semiconductor chip manufacturer, employing at least 22 graduates from the Department of Applied Chemistry and...
Read More
By infosecbulletin
/ Sunday , January 19 2025
vpnMentor’s Research Team is monitoring the potential TikTok ban in the U.S., driven by national security and data privacy issues....
Read More
By infosecbulletin
/ Saturday , January 18 2025
MITRE launched D3FENDTM 1.0, a cybersecurity framework that provides a vocabulary and understanding of the cyber domain. D3FEND 1.0, funded...
Read More
By infosecbulletin
/ Friday , January 17 2025
Amazon Web Services (AWS) has recently fixed two major security vulnerabilities in its cloud services: Amazon WorkSpaces, Amazon AppStream 2.0,...
Read More
By infosecbulletin
/ Friday , January 17 2025
Last year saw a significant rise in cyber threats, with malware becoming more advanced and attack strategies more sophisticated. A...
Read More
By infosecbulletin
/ Thursday , January 16 2025
A recent Infoblox Threat Intel report reveals a sophisticated botnet that exploits DNS misconfigurations to spread malware widely. This botnet,...
Read More
By infosecbulletin
/ Thursday , January 16 2025
A new security flaw traced, CVE-2024-9042, poses a serious risk to Kubernetes clusters with Windows worker nodes. It has a...
Read More
By infosecbulletin
/ Thursday , January 16 2025
The hacking group "Belsen Group" has posted over 15,000 unique FortiGate firewall configurations online. The data dump, reportedly obtained by exploiting...
Read More
By infosecbulletin
/ Thursday , January 16 2025
Registration open for "1st Agile Cyber Drill-2025" scheduled for February 26, 2025 online with an awards ceremony for 9 March...
Read More
ALSO READ:
Bypassing major EDRS using “POOL PARTY”, Hackers revealed
Sophos fixed a security issue in September 2022 after warning about active exploitation in the wild. The issue impacted versions 19.0.1 and older.
By January 2023, more than 4,000 internet-exposed appliances were still vulnerable to attacks, even though the vendor automatically rolled out a hotfix to appliances set to accept security updates.
Many of these appliances were older devices running end-of-life firmware that had to apply mitigations or manually apply the hotfix, and hackers have taken advantage of this gap.
“In December 2023, we delivered an updated fix after identifying new exploit attempts against this same vulnerability in older, unsupported versions of the Sophos Firewall,” reads the updated security bulletin.
“We immediately developed a patch for certain EOL firmware versions, which was automatically applied to the 99% of affected organizations that have ‘accept hotfix’ turned on.”
“Attackers commonly hunt for EOL devices and firmware from any technology vendor, so we strongly recommend that organizations upgrade their EOL devices and firmware to the latest versions.”
If the auto-update option for hotfixes has been disabled, it is recommended to enable it and then check to confirm the hotfix has been applied.
Update to one of the following versions of Sophos Firewall to fix CVE-2022-3236:
v19.0 GA, MR1, and MR1-1
v18.5 GA, MR1, MR1-1, MR2, MR3, and MR4
v18.0 MR3, MR4, MR5, and MR6
v17.5 MR12, MR13, MR14, MR15, MR16, and MR17
v17.0 MR10
v19.0 GA, MR1, and MR1-1
v18.5 GA, MR1, MR1-1, MR2, MR3, and MR4
v17.0 MR10
If you have an older version of the Sophos Firewall, you should upgrade to one of the listed releases.