
Urgent Security Alert: Patch Your Sophos Firewall Now to Prevent Remote Attacks
Cybersecurity teams are on high alert following the disclosure of a critical vulnerability in Sophos Firewall products that could allow attackers to remotely take control of affected systems. This flaw requires immediate attention from all administrators managing these devices to prevent unauthorized access and potential network compromise.
The primary issue is a critical remote code execution (RCE) vulnerability found in the User Portal and Webadmin components of the Sophos Firewall. In simple terms, this means an unauthenticated attacker, with no need for a username or password, could potentially execute malicious code on your firewall from anywhere on the internet.
Successfully exploiting this vulnerability would give an attacker a significant foothold in your network, potentially allowing them to monitor traffic, steal data, or pivot to attack other internal systems.
Which Sophos Firewall Versions Are Affected?
This vulnerability impacts a wide range of Sophos Firewall OS (SFOS) versions. You are at risk if your organization is running:
- Sophos Firewall v19.0 MR1 (19.0.1) and older
- Sophos Firewall v18.5 MR4 (18.5.4) and older
It is crucial to check your device’s current version to determine your exposure.
The Threat is Active and Critical
This is not a theoretical threat. Sophos has confirmed that this vulnerability is actively being exploited in the wild. This significantly increases the urgency for all users to apply the necessary security patches immediately. Waiting to patch leaves your network’s front door wide open to known attack methods.
Sophos has assigned this a “critical” severity rating, underscoring the serious potential for damage if the flaw is left unaddressed.
What You Need to Do Immediately: Your Action Plan
To protect your network, you must take immediate action. Follow these essential security steps:
Apply the Security Patch Now. Sophos has released hotfixes that automatically resolve the vulnerability. Most devices with the “Allow automatic installation of hotfixes” setting enabled should have already received the patch. However, you must verify that the update has been successfully applied. Do not assume you are protected.
Manually Verify Your Version. Log in to your Sophos Firewall and check the firmware version to confirm it is one of the patched releases. The fixed versions include v19.0.2, v18.5.5, and later. If you are not on a patched version, initiate a manual update immediately.
Implement a Temporary Workaround (If You Cannot Patch). If for any reason you are unable to apply the update right away, you must disable WAN access to the User Portal and Webadmin to mitigate the immediate risk. While this is not a permanent solution, it removes the external attack surface until you can properly patch the system.
Beyond the Patch: Proactive Firewall Management
This incident serves as a critical reminder of the importance of robust security hygiene. Your firewall is the gatekeeper of your digital environment, and its security is non-negotiable.
- Enable Automatic Updates: Ensure that automatic security updates and hotfixes are enabled on all critical network infrastructure, including your firewalls.
- Limit Your Attack Surface: Never expose administrative portals (like the Webadmin console) to the public internet unless absolutely necessary. If required, restrict access to specific, trusted IP addresses.
- Regularly Audit and Review: Make firewall rule and configuration reviews a regular part of your security protocol. Outdated rules and unnecessary exposures can create significant risks over time.
The threat posed by this vulnerability is real, and the solution is clear: update your systems without delay. Taking decisive action now is the only way to ensure your network remains secure against these active and ongoing attacks.
Source: https://securityaffairs.com/180283/security/sophos-addressed-five-sophos-firewall-vulnerabilities.html