UK-based cybersecurity firm Sophos this week announced patches for an exploited vulnerability in Firewall versions that have reached End-of-Life.
The critical-severity flaw, tracked as CVE-2022-3236, was found to impact versions 19.0 MR1 and older of the product.
It was originally patched in September 2022, but only in supported versions of Sophos Firewall.
Sophos describes the security defect as a code injection issue in the Firewall's User Portal and Webadmin components, allowing attackers to achieve remote code execution.
This week, the cybersecurity firm updated its advisory to warn of a new in-the-wild exploit targeting the bug, and to draw attention to fixes it has released for older, EOL product versions.
Organizations that have updated their instances to a supported version after September 2022 are protected against these attacks and do not need to take additional action, Sophos says.
Devices running EOL firmware are vulnerable to the new exploit, and Sophos took immediate action to fix certain versions.
Starting December 6, Sophos has been rolling out hotfixes for Firewall versions 19.0 GA, MR1, and MR1-1; 18.5 GA, MR1, MR1-1, MR2, MR3, and MR4; and 17.0 MR10. Sophos has included the fixes in Firewall versions 18.5 MR5, 19.0 MR2, and 19.5 GA, and urges customers using older iterations of the product to upgrade to receive the fixes.
The company has not shared details on the recently observed attacks.
This Cyber News was published on www.securityweek.com. Publication date: Wed, 13 Dec 2023 11:13:05 +0000