CVE-2020-25223

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on Sophos SG UTM devices through the WebAdmin interface. It affects organizations using Sophos SG UTM appliances with vulnerable firmware versions. Attackers can gain full control of affected devices without authentication.

💻 Affected Systems

Products:
  • Sophos SG UTM
Versions: All versions before v9.705 MR5, v9.607 MR7, and v9.511 MR11
Operating Systems: Sophos UTM OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the WebAdmin interface which is typically enabled by default for management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the UTM device, allowing attackers to pivot to internal networks, steal credentials, deploy ransomware, or establish persistent backdoors.

🟠

Likely Case

Remote code execution leading to device takeover, network reconnaissance, and lateral movement within the organization's network.

🟢

If Mitigated

Limited impact if WebAdmin interface is not exposed to untrusted networks and proper network segmentation is in place.

🌐 Internet-Facing: HIGH - WebAdmin interface is typically exposed for remote management, making internet-facing devices extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, any compromised user or malware could exploit this vulnerability to gain device control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on Packet Storm Security. Exploitation requires no authentication and is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v9.705 MR5, v9.607 MR7, or v9.511 MR11

Vendor Advisory: https://community.sophos.com/b/security-blog/posts/advisory-resolved-rce-in-sg-utm-webadmin-cve-2020-25223

Restart Required: Yes

Instructions:

1. Log into Sophos UTM WebAdmin. 2. Navigate to System > Maintenance > Software Updates. 3. Check for available updates. 4. Apply the appropriate MR update for your version. 5. Reboot the appliance after update completes.

🔧 Temporary Workarounds

Restrict WebAdmin Access

all

Limit WebAdmin interface access to trusted IP addresses only using firewall rules.

Configure via WebAdmin: Network Protection > Firewall > Add rule to restrict WebAdmin port (default 4444) to trusted IPs

Disable WebAdmin if Not Needed

all

Temporarily disable WebAdmin interface if remote management is not required.

Configure via WebAdmin: Management > Administration > WebAdmin > Uncheck 'Enable WebAdmin'

🧯 If You Can't Patch

  • Immediately restrict WebAdmin access to specific management IP addresses only
  • Monitor for suspicious activity on WebAdmin port (default 4444) and review authentication logs

🔍 How to Verify

Check if Vulnerable:

Check current firmware version in WebAdmin: System > Status > System Information. Compare against patched versions.

Check Version:

ssh admin@utm-ip 'cat /etc/version' or check WebAdmin System Status page

Verify Fix Applied:

Verify firmware version shows v9.705 MR5, v9.607 MR7, or v9.511 MR11 or later in System Information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts followed by successful WebAdmin access
  • Suspicious processes spawned from WebAdmin service

Network Indicators:

  • Unusual outbound connections from UTM device
  • Traffic to WebAdmin port (4444) from unexpected sources
  • Command injection patterns in HTTP requests to WebAdmin

SIEM Query:

source="sophos-utm" AND (url="*WebAdmin*" AND (method="POST" OR method="GET") AND (content="*;*" OR content="*|*" OR content="*`*"))

🔗 References

📤 Share & Export