跳转到内容
Informational

High

Resolved authenticated RCE issues in User Portal (CVE-2020-17352)

CVE(N)

CVE-2020-17352

产品(N)

Sophos Firewall

更新日

2020 Aug 7

文章版本

1

公開日

2020 Aug 7

公開 ID

sophos-sa-20200807-xg-user-portal-post-auth-rce

回避策

No

Overview

Two vulnerabilities in the User Portal of XG Firewall were recently discovered and responsibly disclosed to Sophos. They were reported via the Sophos bug bounty program by an external security researcher. Both vulnerabilities were post-authentication command injection vulnerabilities and have been fixed.

The remediation prevented authenticated users from remotely executing arbitrary code. There was no evidence that the vulnerabilities were exploited and to our knowledge no customers are impacted.

There is no action required for XG Firewall customers with the "Allow automatic installation of hotfixes" feature enabled. Enabled is the default setting.

Applies to the following Sophos product(s) and version(s)

  • Sophos XG Firewall v18.0 MR1-Build396 and older
  • Sophos XG Firewall v17.5 MR12 and older

Remediation

  • Hotfix for v17.5 MR3, v17.5 MR8 through MR12, and v18.0 GA through MR2 published on August 7, 2020
  • Fix included in v17.5 MR13 and v18.0 MR3
  • Users of older versions of XG Firewall are required to upgrade to receive this fix
  • Additionally, Sophos recommends that XG Firewall customers upgrade to SFOS v18

Related information

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17352

Errata

A previous version of this article incorrectly stated that hotfixes were only released for v18.0 GA through MR1-Build396. It has been corrected to indicate that v18.0 MR2 received a hotfix as well.

Sophos Logo

Sophos Responsible Disclosure Policy

To learn about Sophos security vulnerability disclosure policies and publications, see the Responsible Disclosure Policy.