CVE-2024-12729

8.8 HIGH

📋 TL;DR

This is a post-authentication code injection vulnerability in Sophos Firewall's User Portal that allows authenticated users to execute arbitrary code remotely. It affects Sophos Firewall versions older than 21.0 MR1 (21.0.1). Organizations using vulnerable versions are at risk of compromise by authenticated attackers.

💻 Affected Systems

Products:
  • Sophos Firewall
Versions: All versions older than 21.0 MR1 (21.0.1)
Operating Systems: Sophos Firewall OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the User Portal. All default configurations with User Portal enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain persistent access, exfiltrate sensitive data, pivot to internal networks, and deploy ransomware or other malware.

🟠

Likely Case

Authenticated attackers (including compromised user accounts) executing arbitrary commands to steal credentials, modify firewall rules, or establish backdoors.

🟢

If Mitigated

Limited impact due to strong authentication controls, network segmentation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authentication is obtained. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.0 MR1 (21.0.1) or later

Vendor Advisory: https://www.sophos.com/en-us/security-advisories/sophos-sa-20241219-sfos-rce

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install Sophos Firewall version 21.0.1 or later from Sophos support portal. 3. Apply the update through the firewall web interface. 4. Reboot the firewall as required.

🔧 Temporary Workarounds

Disable User Portal

all

Temporarily disable the User Portal feature to prevent exploitation while planning upgrade.

Restrict User Portal Access

all

Limit User Portal access to specific IP ranges or networks using firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls and multi-factor authentication for all User Portal accounts
  • Monitor User Portal access logs for suspicious activity and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check Sophos Firewall version in web interface under System > Administration > System Information. If version is older than 21.0.1, system is vulnerable.

Check Version:

ssh admin@firewall_ip 'cat /etc/version' or check web interface

Verify Fix Applied:

After update, verify version shows 21.0.1 or higher in System > Administration > System Information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual User Portal login patterns
  • Suspicious command execution in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected outbound connections from firewall
  • Anomalous traffic patterns from firewall management interface

SIEM Query:

source="sophos_firewall" AND (event_type="user_portal_access" AND user_agent="*" OR command="*" )

🔗 References

📤 Share & Export