December 30 Advisory: Critical Vulnerabilities in Sophos Firewalls [CVE-2024-12727, CVE-2024-12728, & CVE-2024-12729]

Rapid Response

Date of Disclosure (source): December 19, 2024

CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729 are vulnerabilities affecting Sophos Firewalls. At the time of writing, we did not observe public exploits or evidence of active exploitation for any of these vulnerabilities:

  • CVE-2024-12727 is a pre-auth SQL injection vulnerability in the email protection feature of Sophos Firewall versions older than 21.0 MR1 (21.0.1). It has been assigned a CVSS score of 9.8 (critical) by Sophos Limited.
  • CVE-2024-12728 is a weak credentials vulnerability that potentially allows privileged system access via SSH to Sophos Firewall older than version 20.0 MR3 (20.0.3). It has been assigned a CVSS score of 9.8 (critical) by Sophos Limited.
  • CVE-2024-12729 is a post-auth code injection vulnerability in the User Portal that allows authenticated users to execute code remotely in Sophos Firewall older than version 21.0 MR1 (21.0.1). It has been assigned a CVSS score of 8.8 (high) by Sophos Limited.

Sophos has not observed any active exploitation of these vulnerabilities at the time of releasing their security advisory. Their advisory includes remediation steps for each of the vulnerabilities and workarounds for CVE-2024-12728 and CVE-2024-12729. 

FieldDetails
CVE-IDCVE-2024-12727 – CVSS 9.8 (critical) – assigned by Sophos LimitedCVE-2024-12728 – CVSS 9.8 (critical) – assigned by Sophos LimitedCVE-2024-12729 – CVSS 8.8 (high) – assigned by Sophos Limited
Vulnerability DescriptionA pre-auth SQL injection vulnerability in the email protection feature of Sophos Firewall versions older than 21.0 MR1 (21.0.1) allows access to the reporting database and can lead to remote code execution if a specific configuration of Secure PDF eXchange (SPX) is enabled in combination with the firewall running in High Availability (HA) mode.A weak credentials vulnerability potentially allows privileged system access via SSH to Sophos Firewall older than version 20.0 MR3 (20.0.3).A post-auth code injection vulnerability in the User Portal allows authenticated users to execute code remotely in Sophos Firewall older than version 21.0 MR1 (21.0.1).
Date of DisclosureDecember 19, 2024
Affected AssetsEmail protection feature of Sophos FirewallSSH module of Sophos Firewall User Portal of Sophos Firewall
Vulnerable Software Versions < 21.0 MR1 (21.0.1)< 20.0 MR3 (20.0.3)< 21.0 MR1 (21.0.1)
PoC Available?No PoC available at the time of writing.
Exploitation StatusNo evidence of active exploitation at the time of writing.
Patch StatusSophos has provided remediation guidance in their security advisory published on December 19, 2024. 

Censys Perspective

At the time of writing, Censys observed 57,247 exposed Sophos Firewalls. A large proportion of these (22%) are geolocated in India. Note that not all instances observed are necessarily vulnerable as we do not always have specific versions available.

Map of Exposed Sophos Firewall Instances:

Censys Search Query:

services.http.response.body:"uiLangToHTMLLangAttributeValueMapping" or services.software: (vendor = "Sophos" and product="XG Firewall")

Censys ASM Query:

host.services.http.response.body:"uiLangToHTMLLangAttributeValueMapping" or host.services.software: (vendor = "Sophos" and product="XG Firewall")

References