Security News > 2022 > September > Sophos warns of new firewall RCE bug exploited in attacks
Sophos warned today that a critical code injection security vulnerability in the company's Firewall product is being exploited in the wild.
The company says it has released hotfixes for Sophos Firewall versions affected by this security bug and older) that will roll out automatically to all instances since automatic updates are enabled by default.
"No action is required for Sophos Firewall customers with the 'Allow automatic installation of hotfixes' feature enabled on remediated versions. Enabled is the default setting," Sophos explained.
Patching your Sophos Firewall bugs is critically important, especially since this is not the first such flaw exploited in the wild.
Sophos patched a similar critical Sophos Firewall bug in March, discovered in the User Portal and Webadmin, letting threat actors bypass authentication and execute arbitrary code.
As part of attacks where the zero-day was used, Asnarök trojan malware exploited it to try and steal firewall credentials from vulnerable XG Firewall instances.
News URL
Related news
- Critical Ivanti RCE flaw with public exploit now used in attacks (source)
- New scanner finds Linux, UNIX servers exposed to CUPS RCE attacks (source)
- CISA says critical Fortinet RCE flaw now exploited in attacks (source)
- Custom "Pygmy Goat" malware used in Sophos Firewall hack on govt network (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration (source)
- CISA Flags Two Actively Exploited Palo Alto Flaws; New RCE Attack Confirmed (source)
- Palo Alto Networks firewalls, Expedition under attack (CVE-2024-9463, CVE-2024-9465) (source)
- Palo Alto Networks warns of critical RCE zero-day exploited in attacks (source)
- Critical RCE bug in VMware vCenter Server now exploited in attacks (source)