Weak Credentials Vulnerability in Sophos Firewall Affecting Older Versions
CVE-2024-12728

9.8CRITICAL

Key Information:

Vendor
Sophos
Vendor
CVE Published:
19 December 2024

Badges

๐Ÿ‘พ Exploit Exists๐Ÿ“ฐ News Worthy

Summary

CVE-2024-12728 is a significant weak credentials vulnerability identified in Sophos Firewall, affecting all versions prior to 20.0 MR3 (20.0.3). This vulnerability potentially allows unauthorized users to achieve privileged system access via secure shell (SSH) protocols. Organizations utilizing these affected versions are strongly advised to upgrade to the latest software version to mitigate risks of unauthorized access and potential exploitation. For more information and guidance, visit the official Sophos security advisory.

Affected Version(s)

Sophos Firewall 0 < 20.0 MR3 (20.0.3)

Get notified when SecurityVulnerability.io launches alerting ๐Ÿ””

News Articles

Sophos issues hotfixes for three critical flaws in XG firewall

Sophos has issued hotfixes to resolve three security vulnerabilities in its Firewall products. These flaws, under certain conditions, could enable remote code execution and grant privileged system...

Critical Sophos Firewall Vulnerabilities Let Attackers Execute Remote Code

Sophos, a leading cybersecurity firm, recently announced the resolution of three critical security vulnerabilities in its Sophos Firewall product. These vulnerabilities could potentially allow attackers to execute remote code on affected systems.

Sophos Firewall vulnerable to critical remote code execution flaw

Sophos has addressed three vulnerabilities in its Sophos Firewall product that could allow remote unauthenticated threat actors to perform SQL injection, remote code execution, and gain privileged SSH access to devices.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿ“ฐ

    First article discovered by The Hacker News

  • Vulnerability published

  • Vulnerability Reserved

.
๐Ÿช This website uses cookies, like every other website on the internet ๐Ÿ˜• By using our website, you consent to the use of cookies.