Sophos fixes vulnerabilities in its Web security appliance

The flaws could allow attackers to execute commands with high privileges and read sensitive passwords stored on the product

Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface.

The vulnerabilities could allow attackers to gain access to configuration files containing sensitive information like plaintext passwords for other internal network services, execute commands as a highly privileged system user and launch phishing attacks against users of the appliance.

The Sophos Web Protection Appliance provides URL filtering, real-time Web content analysis and Web access policy enforcement. It also has the ability to scan encrypted HTTPS Web traffic by using self-generated Certificate Authority (CA) certificates deployed on all endpoints.

According to security researchers from Austria-based security firm SEC Consult, who found the vulnerabilities, attackers could exploit one of the flaws to steal the private CA key stored on the appliance and use it to launch man-in-the-middle traffic interception attacks against users on the internal network.

The SEC Consult researchers reported the vulnerabilities to Sophos on Feb. 21.

"The issues reported were resolved with the 3.7.8.2 release of the Sophos Web Appliance software in March 2013," Sophos said in an advisory published on its website this week. "This went to an initial group of customers on March 18, to a larger group on March 25 and will be made available to all remaining customers on April 1."

Appliances should be updated automatically within a few days after the fixed version has been released. However, customers can also initiate a manual update from Configuration > System > Updates page in the product's interface, Sophos said.

The SEC Consult researchers believe that the appliance might have more vulnerabilities. "The recommendation of SEC Consult is to switch off the product until a comprehensive security audit based on a security source code review has been performed and all identified security deficiencies have been resolved by the vendor," they said Wednesday in their own advisory about the issues.

The news comes after Ben Williams, a penetration tester at NCC Group, warned at the Black Hat Europe security conference last month that security appliances from many vendors contain serious vulnerabilities, most of which are located in their Web-based user interfaces.

Williams analyzed different types of appliances from some of the leading security vendors, including Symantec, Sophos, Trend Micro, Cisco, Barracuda, McAfee and Citrix, and said that over 80 percent of them contained serious vulnerabilities that were relatively easy to find.

One of the examples presented by Williams during his talk at Black Hat Europe and covered in more detail in a white paper released later, involved multiple vulnerabilities that he found in the Sophos Email Appliance last year.

"The Sophos Email Appliance (v3.7.4.0) had multiple vulnerabilities which in combination could allow the system to be fully compromised, giving an attacker both administrative access to the UI, and a root shell on the underlying operating system," Williams said in the paper. "These included various instances of command injection, XSS with session-hijacking, CSRF, session-fixation, etc."

Sophos addressed those flaws in January 2013, along with other issues discovered during its own security review of the product. Williams commended Sophos for the auto-update feature built into its appliances, which he said is not the norm in products from other vendors.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Topics: firewalls, patches, security, Networking, NCC Group, patch management, Exploits / vulnerabilities, SEC Consult, sophos, intrusion
Comments are now closed.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
Use WhistleOut's technology to compare:
Mobile phone plans & deals
Mobile phone models
Mobile phone carriers
Broadband plans & deals
Broadband providers
Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?