CVE-2022-4934

7.2 HIGH

📋 TL;DR

This CVE describes a post-authentication command injection vulnerability in Sophos Web Appliance's exception wizard. It allows authenticated administrators to execute arbitrary code on the system. Only administrators with valid credentials can exploit this vulnerability.

💻 Affected Systems

Products:
  • Sophos Web Appliance
Versions: All versions older than 4.3.10.4
Operating Systems: Sophos Web Appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with administrator access enabled. The vulnerability is in the exception wizard feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with administrator credentials could gain full control of the appliance, potentially pivoting to internal networks, stealing sensitive data, or deploying persistent backdoors.

🟠

Likely Case

Malicious insider or compromised administrator account could execute arbitrary commands to disrupt services, exfiltrate data, or maintain persistence on the appliance.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be limited to authorized administrators and would be detectable through security monitoring.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires authentication, internet-facing appliances with administrator interfaces exposed could be targeted through credential theft or brute force attacks.
🏢 Internal Only: HIGH - Internal attackers with administrator access or compromised credentials could easily exploit this to gain full control of the appliance.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid administrator credentials. The vulnerability is in a post-authentication component, making it accessible only to authorized users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.10.4

Vendor Advisory: https://www.sophos.com/en-us/security-advisories/sophos-sa-20230404-swa-rce

Restart Required: Yes

Instructions:

1. Log into Sophos Web Appliance admin interface. 2. Navigate to System > Updates. 3. Check for and apply update to version 4.3.10.4 or later. 4. Restart the appliance as prompted.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit administrator account access to only trusted personnel and implement multi-factor authentication if available.

Network Segmentation

all

Restrict network access to the admin interface using firewall rules to only allow connections from trusted management networks.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for administrator accounts
  • Consider temporarily disabling the exception wizard feature if not required

🔍 How to Verify

Check if Vulnerable:

Check the appliance version in the admin interface under System > About. If version is older than 4.3.10.4, the system is vulnerable.

Check Version:

ssh admin@appliance-ip 'cat /etc/version' or check via web interface at System > About

Verify Fix Applied:

After updating, verify the version shows 4.3.10.4 or later in System > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator login patterns
  • Commands executed via exception wizard with suspicious parameters
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from the appliance
  • Traffic to unexpected destinations from appliance management interface

SIEM Query:

source="sophos-web-appliance" AND (event_type="admin_login" OR event_type="exception_wizard_exec") | stats count by user, src_ip

🔗 References

📤 Share & Export