Vulnerabilities (CVE)

Filtered by vendor Sophos Subscribe
Filtered by product Xg Firewall
Total 13 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-3713 1 Sophos 2 Xg Firewall, Xg Firewall Firmware 2024-11-21 N/A 8.8 HIGH
A code injection vulnerability allows adjacent attackers to execute code in the Wifi controller of Sophos Firewall releases older than version 19.5 GA.
CVE-2022-3711 1 Sophos 2 Xg Firewall, Xg Firewall Firmware 2024-11-21 N/A 4.3 MEDIUM
A post-auth read-only SQL injection vulnerability allows users to read non-sensitive configuration database contents in the User Portal of Sophos Firewall releases older than version 19.5 GA.
CVE-2022-3710 1 Sophos 2 Xg Firewall, Xg Firewall Firmware 2024-11-21 N/A 2.7 LOW
A post-auth read-only SQL injection vulnerability allows API clients to read non-sensitive configuration database contents in the API controller of Sophos Firewall releases older than version 19.5 GA.
CVE-2022-3709 1 Sophos 2 Xg Firewall, Xg Firewall Firmware 2024-11-21 N/A 6.8 MEDIUM
A stored XSS vulnerability allows admin to super-admin privilege escalation in the Webadmin import group wizard of Sophos Firewall releases older than version 19.5 GA.
CVE-2022-3696 1 Sophos 2 Xg Firewall, Xg Firewall Firmware 2024-11-21 N/A 7.2 HIGH
A post-auth code injection vulnerability allows admins to execute code in Webadmin of Sophos Firewall releases older than version 19.5 GA.
CVE-2022-3226 1 Sophos 2 Xg Firewall, Xg Firewall Firmware 2024-11-21 N/A 7.2 HIGH
An OS command injection vulnerability allows admins to execute code via SSL VPN configuration uploads in Sophos Firewall releases older than version 19.5 GA.
CVE-2020-15069 1 Sophos 2 Xg Firewall, Xg Firewall Firmware 2024-11-21 7.5 HIGH 9.8 CRITICAL
Sophos XG Firewall 17.x through v17.5 MR12 allows a Buffer Overflow and remote code execution via the HTTP/S Bookmarks feature for clientless access. Hotfix HF062020.1 was published for all firewalls running v17.x.
CVE-2020-12271 1 Sophos 2 Sfos, Xg Firewall 2024-11-21 7.5 HIGH 9.8 CRITICAL
A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords)
CVE-2020-11503 1 Sophos 2 Sfos, Xg Firewall 2024-11-21 7.5 HIGH 9.8 CRITICAL
A heap-based buffer overflow in the awarrensmtp component of Sophos XG Firewall v17.5 MR11 and older potentially allows an attacker to run arbitrary code remotely.
CVE-2018-16118 1 Sophos 2 Sfos, Xg Firewall 2024-11-21 9.3 HIGH 8.1 HIGH
A shell escape vulnerability in /webconsole/APIController in the API Configuration component of Sophos XG firewall 17.0.8 MR-8 allows remote attackers to execute arbitrary OS commands via shell metachracters in the "X-Forwarded-for" HTTP header.
CVE-2018-16117 1 Sophos 2 Sfos, Xg Firewall 2024-11-21 9.0 HIGH 8.8 HIGH
A shell escape vulnerability in /webconsole/Controller in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary OS commands via shell metacharacters in the "dbName" POST parameter.
CVE-2018-16116 1 Sophos 2 Sfos, Xg Firewall 2024-11-21 6.5 MEDIUM 8.8 HIGH
SQL injection vulnerability in AccountStatus.jsp in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary SQL commands via the "username" GET parameter.
CVE-2017-18014 1 Sophos 2 Sfos, Xg Firewall 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -> Log Viewer -> in the filter option "Web Server Protection") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the "User-Agent" parameter in the HTTP POST request.