CVE-2020-15069

9.8 CRITICAL

📋 TL;DR

This is a critical buffer overflow vulnerability in Sophos XG Firewall's HTTP/S Bookmarks feature for clientless access. It allows remote attackers to execute arbitrary code on affected firewalls. All organizations running vulnerable versions of Sophos XG Firewall are affected.

💻 Affected Systems

Products:
  • Sophos XG Firewall
Versions: 17.x through v17.5 MR12
Operating Systems: Sophos XG Firewall OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the clientless access user portal feature. All firewalls running vulnerable versions with this feature enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain full control of the firewall, pivot to internal networks, intercept/modify traffic, and establish persistent access.

🟠

Likely Case

Remote code execution leading to firewall compromise, credential theft, network reconnaissance, and potential lateral movement to internal systems.

🟢

If Mitigated

No impact if properly patched or if vulnerable feature is disabled and firewall is not internet-facing.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Hotfix HF062020.1 for v17.x, or upgrade to v18+

Vendor Advisory: https://community.sophos.com/b/security-blog/posts/advisory-buffer-overflow-vulnerability-in-user-portal

Restart Required: Yes

Instructions:

1. Log into Sophos XG Firewall admin interface. 2. Navigate to Backup & Firmware > Hotfix. 3. Download and apply Hotfix HF062020.1. 4. Alternatively, upgrade to v18 or later. 5. Reboot the firewall after applying the fix.

🔧 Temporary Workarounds

Disable Clientless Access User Portal

all

Temporarily disable the vulnerable HTTP/S Bookmarks feature until patching can be completed.

Navigate to: System > Administration > User Portal > Disable 'Enable clientless access'

🧯 If You Can't Patch

  • Immediately disable the clientless access user portal feature
  • Restrict access to the user portal interface using firewall rules or network segmentation

🔍 How to Verify

Check if Vulnerable:

Check firewall version via admin interface: System > Administration > Device Access > Firmware Version. If version is between 17.0 and 17.5 MR12, you are vulnerable.

Check Version:

ssh admin@firewall_ip 'show system firmware' or check via web admin interface

Verify Fix Applied:

After applying hotfix, verify version shows HF062020.1 applied or version is 18+. Also verify clientless access is disabled if using workaround.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to /userportal/webpages/*
  • Buffer overflow errors in system logs
  • Unexpected process execution from web server

Network Indicators:

  • Exploit traffic patterns to user portal endpoints
  • Unusual outbound connections from firewall after exploitation

SIEM Query:

source="sophos_firewall" AND (uri_path="/userportal/webpages/*" AND status=500) OR (event_type="buffer_overflow")

🔗 References

📤 Share & Export