This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

KBA 135412 - XG Firewall Vulnerability - SQL Injection - HTTPS 8443 Port

Hello,

 

I have checked all the firewalls I'm managing for my custommers and all I can say is that on 46 firewalls that I manage, 9 have been compromised with this SQL injection. The only thing which differs on the 9 compromised firewalls compared to the 37 others, is the HTTPS port used for the User Portal.

The 9 compromised firewalls were using the 8443 HTTPS port for User Portal. The 37 other firewalls are not using this port, but another one and they are not affected by this attack.

 

So maybe the vulnerability can only affect the firewalls with the 8443 HTTPS port on the user portal ?

 

Regards.



This thread was automatically locked due to age.
Parents
  • Same here. I've identified 5 out of 15 firewalls so far.

    all of them show the messages

    Alert
    14:45
     
    Hotfix applied for SQL Injection and partially cleaned. Additional steps may be required to secure your network. Please read KBA-135412 for possible next steps.

     

    This should not be possible since we do not allow https from WAN. We strictly disable it and except only a handful of trusted IP addresses. 

    Sophos needs to clarify ASAP if this is false positive or if the exploit also affected WAF, Userportal, SSLVPN... services.

  • Hi  

    We sincerely regret any inconvenience this has caused. This is not a false positive.

    Details are found in the KBA. It will continue to be updated as more information becomes available (https://community.sophos.com/kb/en-us/135412):

    • Sophos received a report on April 22, 2020, at 20:29 UTC regarding an XG Firewall with a suspicious field value visible in the management interface. Sophos commenced an investigation and the incident was determined to be an attack against physical and virtual XG Firewall units. The attack affected systems configured with either the administration (HTTPS service) or the User Portal exposed on the WAN zone.

    Regards,

Reply
  • Hi  

    We sincerely regret any inconvenience this has caused. This is not a false positive.

    Details are found in the KBA. It will continue to be updated as more information becomes available (https://community.sophos.com/kb/en-us/135412):

    • Sophos received a report on April 22, 2020, at 20:29 UTC regarding an XG Firewall with a suspicious field value visible in the management interface. Sophos commenced an investigation and the incident was determined to be an attack against physical and virtual XG Firewall units. The attack affected systems configured with either the administration (HTTPS service) or the User Portal exposed on the WAN zone.

    Regards,

Children
No Data