CVE-2024-13974

8.1 HIGH

📋 TL;DR

This vulnerability in Sophos Firewall's Up2Date component allows attackers who control the firewall's DNS environment to achieve remote code execution. It affects Sophos Firewall versions older than 21.0 MR1 (20.0.1). Organizations using vulnerable versions are at risk of complete firewall compromise.

💻 Affected Systems

Products:
  • Sophos Firewall
Versions: All versions older than 21.0 MR1 (20.0.1)
Operating Systems: Sophos Firewall OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Up2Date component which handles updates and DNS resolution.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete firewall takeover leading to network compromise, data exfiltration, and lateral movement into internal networks.

🟠

Likely Case

Attackers gain administrative control of the firewall, enabling traffic interception, rule modification, and credential theft.

🟢

If Mitigated

Limited impact with proper network segmentation and DNS security controls in place.

🌐 Internet-Facing: HIGH - Firewalls are typically internet-facing perimeter devices directly exposed to attackers.
🏢 Internal Only: MEDIUM - Requires DNS control but could be exploited from internal networks if DNS is compromised.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires DNS control but no authentication. Business logic vulnerability makes exploitation straightforward once DNS is compromised.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.0 MR1 (20.0.1) or later

Vendor Advisory: https://www.sophos.com/en-us/security-advisories/sophos-sa-20250721-sfos-rce

Restart Required: Yes

Instructions:

1. Log into Sophos Firewall admin interface. 2. Navigate to System > Administration > Updates. 3. Check for and apply available updates to version 21.0 MR1 or later. 4. Reboot the firewall after update completion.

🔧 Temporary Workarounds

Restrict DNS Configuration

all

Limit DNS server configuration to trusted internal servers only and prevent external DNS control.

Network Segmentation

all

Isolate firewall management interfaces from untrusted networks and implement strict DNS traffic filtering.

🧯 If You Can't Patch

  • Implement strict DNS security controls and monitoring for DNS hijacking attempts.
  • Isolate firewall management interfaces and restrict access to trusted IP addresses only.

🔍 How to Verify

Check if Vulnerable:

Check Sophos Firewall version via admin interface: System > Administration > Updates. Versions older than 21.0 MR1 (20.0.1) are vulnerable.

Check Version:

ssh admin@firewall_ip 'show version' or check web interface

Verify Fix Applied:

Confirm version is 21.0 MR1 (20.0.1) or later in System > Administration > Updates.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DNS resolution patterns
  • Unauthorized configuration changes to Up2Date settings
  • Suspicious update attempts

Network Indicators:

  • DNS traffic anomalies to/from firewall
  • Unexpected outbound connections from firewall management interfaces

SIEM Query:

source="sophos_firewall" AND (event_type="dns_query" AND query_domain NOT IN allowed_domains) OR (event_type="config_change" AND component="up2date")

🔗 References

📤 Share & Export