Vulnerabilities

Sophos Patches Critical Code Execution Vulnerability in Web Security Appliance

Sophos patches critical unauthenticated code execution vulnerability in Sophos Web Appliance.

Sophos patches critical unauthenticated code execution vulnerability in Sophos Web Appliance.

Sophos this week announced security updates that resolve several vulnerabilities in Sophos Web Appliance, including a critical bug leading to code execution.

A web security solution, the Sophos Web Appliance allows administrators to set web access policies, define them by users or groups, and enforce them as necessary, from a single interface.

The critical issue, tracked as CVE-2023-1671 (CVSS score of 9.8), was identified in the warning page handler of the appliance and it could be exploited without authentication.

Sophos describes the bug as “a pre-auth command injection vulnerability in the warn-proceed handler allowing execution of arbitrary code”.

The cybersecurity company resolved the flaw with the release of Sophos Web Appliance 4.3.10.4, which addresses two other bugs as well.

The first is a high-severity code execution issue in the exception wizard. Tracked as CVE-2022-4934 (CVSS score of 7.2) and described as a command injection vulnerability, the flaw requires authentication for successful exploitation.

The second is CVE-2020-36692, a medium-severity cross-site scripting (XSS) flaw in the report scheduler. An attacker could exploit the vulnerability to execute JavaScript code in the victim’s browser.

“The victim must be tricked into submitting a malicious form on an attacker-controlled website while logged in to [Sophos Web Appliance] for the attack to succeed,” the cybersecurity firm explains.

Advertisement. Scroll to continue reading.

Patches for all vulnerabilities are delivered to Sophos Web Appliance users via automatic updates. Sophos recommends placing the appliance behind a firewall and blocking internet access to it.

Sophos Web Appliance is set to reach end-of-life (EoL) status on July 20, 2023. Sophos recommends that Web Appliance customers migrate to Sophos Firewall.

Related: Several Code Execution Vulnerabilities Patched in Sophos Firewall

Related: Sophos Firewall Zero-Day Exploited in Attacks on South Asian Organizations

Related: Sophos Warns of Attacks Exploiting Recent Firewall Vulnerability

Related Content

Vulnerabilities

A vulnerability (CVE-2024-27322) in the R programming language implementation can be exploited to execute arbitrary and be used as part of a supply chain...

Vulnerabilities

Cisco patches a high-severity Integrated Management Controller vulnerability for which PoC exploit code is available.

Vulnerabilities

PAM company Delinea over the weekend rushed to patch a critical authentication bypass vulnerability after it apparently ignored the researcher who found the flaw.

Vulnerabilities

Juniper Networks patches dozens of vulnerabilities in Junos OS, Junos OS Evolved, and other products.

Application Security

A critical vulnerability in multiple programming languages allows attackers to inject commands in Windows applications.

Vulnerabilities

A critical OS command injection in Progress Flowmon can be exploited to gain remote, unauthenticated access to the system.

Vulnerabilities

A critical SQL injection vulnerability in the LayerSlider WordPress plugin allows attackers to extract sensitive information.

Vulnerabilities

JetBrains patches 26 security issues in TeamCity and takes steps to avoid malicious exploitation of vulnerabilities.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version