This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Action Required: XG Firewall Remote Code Execution Vulnerability - Did you have questions about the Sophos email from Nov 8 2019?

The email with subject "Action Required: XG Firewall Remote Code Execution Vulnerability" has a reference in it to check KBA 134852.  It doesn't really tell you a lot and you have to take a bit of it on assumption.  I checked all my XG firewalls and they were all ok, with the exception of 1 that was running old firmware.  I do have the SFOS Hotfix "Allow auto-install of hotfixes" setting enabled on the Firmware download page for all my firewalls.  I did expand a bit upon the KBA in my own article on Google Docs Check for Emergency Hotfix on Sophos XG.  It's set for public viewing.  I was able to grab an example of a non-patched dropbear installation on the 17.5.8 firmware I just updated that other firewall to, and included that in my doc.

I found the Sophos official KBA 134852 not terribly helpful in really making me comfortable in knowing I'd had the correct hotfix installed.  I immediately had questions:

  • what even is dropbear (it's the SSH implementation in the sophos firewall OS/XG platform)
  • why is the md5 hash I'm looking to compare my result to listed as an example, instead of as "THE RIGHT ANSWER"?
  • what are examples of not good MD5 hashes?
  • what if I have an earlier than 17.5.8 MR-8 firmware installed?

And with the email in general:

  • what if i don't want to introduce problems with my configuration with a new untested firmware like 17.5.9?
  • are there any fixes available for other firmware not 17.5.8 or 17.5.9?

I hope the extra detail I wrote for my customer who has 3 firewalls I can't access at the moment might help some of you.  Any questions, by all means ask here :)



This thread was automatically locked due to age.
Parents
  • Sophos implement security "by-silence" in a hope hackers will not discover anything.

    KB articles are too often just a title with absolutely no details.

    Users have been requesting far more details since forever and ad nauseam.

    Sorry, but that's the reality.

    Main problem with Sophos is whenever you Google about any of their product, the vast majority of informations comes from the community.

    If you google anyone else, Cisco, Checkpoint, whatever, you will get tons of blogs from hundreds of sites.  So finding info with them is always possible.

    Paul Jr

Reply
  • Sophos implement security "by-silence" in a hope hackers will not discover anything.

    KB articles are too often just a title with absolutely no details.

    Users have been requesting far more details since forever and ad nauseam.

    Sorry, but that's the reality.

    Main problem with Sophos is whenever you Google about any of their product, the vast majority of informations comes from the community.

    If you google anyone else, Cisco, Checkpoint, whatever, you will get tons of blogs from hundreds of sites.  So finding info with them is always possible.

    Paul Jr

Children
No Data