CVE-2022-0386

8.8 HIGH

📋 TL;DR

This is a post-authentication SQL injection vulnerability in Sophos UTM's Mail Manager component. An authenticated attacker could potentially execute arbitrary SQL commands, which may lead to remote code execution. Only Sophos UTM installations before version 9.710 are affected.

💻 Affected Systems

Products:
  • Sophos UTM
Versions: All versions before 9.710
Operating Systems: Sophos UTM OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Mail Manager component. All Sophos UTM deployments with Mail Manager enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains full system compromise through SQL injection leading to remote code execution, potentially allowing data theft, lateral movement, or ransomware deployment.

🟠

Likely Case

Authenticated attacker extracts sensitive database information, modifies mail management configurations, or gains limited system access.

🟢

If Mitigated

With proper authentication controls and network segmentation, impact is limited to the mail management component only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to exploit. SQL injection could potentially lead to code execution in the context of the application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.710

Vendor Advisory: https://www.sophos.com/en-us/security-advisories/sophos-sa-20220321-utm-9710

Restart Required: Yes

Instructions:

1. Log into Sophos UTM web admin interface. 2. Navigate to System > Maintenance > Update. 3. Download and apply update to version 9.710 or later. 4. Reboot the system after update completes.

🔧 Temporary Workarounds

Disable Mail Manager

all

Temporarily disable the Mail Manager component if not required

Restrict Access

all

Limit access to Sophos UTM admin interface to trusted IP addresses only

🧯 If You Can't Patch

  • Implement strict access controls to Sophos UTM admin interface
  • Monitor for suspicious SQL queries in application logs

🔍 How to Verify

Check if Vulnerable:

Check Sophos UTM version in web admin interface under System > Status > System Information

Check Version:

ssh admin@utm-ip 'cat /etc/version'

Verify Fix Applied:

Confirm version is 9.710 or higher in System > Status > System Information

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in mail manager logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual database connections from UTM system
  • SQL error messages in HTTP responses

SIEM Query:

source="sophos_utm" AND ("sql" OR "injection" OR "mail_manager")

🔗 References

📤 Share & Export