9.8
CVSSv3

CVE-2022-1040

Published: 25/03/2022 Updated: 08/08/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 670
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An authentication bypass vulnerability in the User Portal and Webadmin allows a remote malicious user to execute code in Sophos Firewall version v18.5 MR3 and older.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sophos sfos

Exploits

Sophos XG115w Firewall version 17010 MR-10 suffers from an authentication bypass vulnerability ...

Github Repositories

This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication

CVE-2022-1040 : Sophos XG115w Firewall 17010 MR-10 - Authentication Bypass This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication ☕️ Live : updated

New exploitation of 2020 Sophos vuln

CVE-2022-1040-sophos-rce-poc sophos rce poc sophos webmin portal auth bypass and rce all in one script; The vulnerability affects Sophos Firewall v185 MR3 (1853) and older Mitigation: update to latest version asap supportsophoscom/support/s/article/KB-000043853?language=en_US to avoid misusing of this script its not for free: it contains the script and a freshly du

may the poc with you

CVE-2022-1040 may the poc with you 外面捡来的 curl --insecure -H "X-Requested-With: XMLHttpRequest" -X POST 'xxxx/userportal/Controller?mode=8700&operation=1&datagrid=179&json=\{"🦞":"test"\}'

Sophos EXploit

CVE-2022-1040 Here is the Sophos exploit found on 2022-08-04 working on version 17010 MR-10

Save the trouble to open the burpsuite...

Environment In Python Environment(310) # It's strongly recommended to use the virtual environment) pip3 install baseproxy # python310 will raise an AttributeError if the version of pyOpenSSL(downloaded with baseproxy) is too low Reinstalling the latest version will fix it pip3 uninstall pyOpenSSL pip3 install pyOpenSSL # run python3 Sophos-pocpy

CVE-2022-1040

Análisis Vulnerabilidad CVE-2022-1040 (Sophos RCE) En el grupo de investigación Toasec, dedicado a ciberseguridad ofensiva nos dimos la tarea de realizar el análisis sobre esta vulnerabilidad en los firewalls de Sophos Dicha vulnerabilidad como muchas otras pueden ser notificadas y encontradas si sabes buscar en twitter, en donde observamos que desde el me

Recent Articles

Sophos fixes critical hijack flaw in firewall offering
The Register • Jeff Burt • 01 Jan 1970

Get our weekly newsletter Authentication bypass followed by remote-code execution at the network boundary Sophos: Log4Shell would have been a catastrophe without the Y2K-esque mobilisation of engineers

Sophos has patched a remote code execution (RCE) vulnerability in its firewall gear that was disclosed via its bug-bounty program. The supplier wrote in a brief notice on Friday that an authentication bypass flaw can be potentially exploited over the network or internet by miscreants to execute malicious code on a victim's equipment, hijacking it effectively. The flaw is present in the User Portal and Webadmin user interfaces of Sophos Firewall. This product, using its Xstream architecture, is s...

Sophos fixes critical firewall hole exploited by miscreants
The Register

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Code-injection bug in your network security... mmm, yum yum

A critical code-injection vulnerability in Sophos Firewall has been fixed — but not before miscreants found and exploited the bug. The flaw, tracked as CVE-2022-3236, exists in the User Portal and Webadmin components of the firewall in versions 19.0 and older. While it hasn't been issued a CVSS severity score, Sophos deemed it "critical" and noted that it allowed for remote code execution. "Sophos has observed this vulnerability being used to target a small set of specific organizations, ...