Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Sophos Patches Critical Code Execution Vulnerability in Web Security Appliance

Sophos patches critical unauthenticated code execution vulnerability in Sophos Web Appliance.

Sophos this week announced security updates that resolve several vulnerabilities in Sophos Web Appliance, including a critical bug leading to code execution.

A web security solution, the Sophos Web Appliance allows administrators to set web access policies, define them by users or groups, and enforce them as necessary, from a single interface.

The critical issue, tracked as CVE-2023-1671 (CVSS score of 9.8), was identified in the warning page handler of the appliance and it could be exploited without authentication.

Sophos describes the bug as “a pre-auth command injection vulnerability in the warn-proceed handler allowing execution of arbitrary code”.

The cybersecurity company resolved the flaw with the release of Sophos Web Appliance 4.3.10.4, which addresses two other bugs as well.

The first is a high-severity code execution issue in the exception wizard. Tracked as CVE-2022-4934 (CVSS score of 7.2) and described as a command injection vulnerability, the flaw requires authentication for successful exploitation.

The second is CVE-2020-36692, a medium-severity cross-site scripting (XSS) flaw in the report scheduler. An attacker could exploit the vulnerability to execute JavaScript code in the victim’s browser.

“The victim must be tricked into submitting a malicious form on an attacker-controlled website while logged in to [Sophos Web Appliance] for the attack to succeed,” the cybersecurity firm explains.

Advertisement. Scroll to continue reading.

Patches for all vulnerabilities are delivered to Sophos Web Appliance users via automatic updates. Sophos recommends placing the appliance behind a firewall and blocking internet access to it.

Sophos Web Appliance is set to reach end-of-life (EoL) status on July 20, 2023. Sophos recommends that Web Appliance customers migrate to Sophos Firewall.

Related: Several Code Execution Vulnerabilities Patched in Sophos Firewall

Related: Sophos Firewall Zero-Day Exploited in Attacks on South Asian Organizations

Related: Sophos Warns of Attacks Exploiting Recent Firewall Vulnerability

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.