

Organizations using vulnerable versions of the Sophos UTM appliance have to update them immediately. We now have unauthenticated RCE on the Sophos UTM appliance as the root user.“ User-Agent: Mozilla/5.0 (X11 Ubuntu Linux x86_64 rv:91.0) Gecko/20100101 Firefox/91.0Īccept: text/javascript, text/html, application/xml, text/xml, */*Ĭontent-type: application/json charset=UTF-8 Making the request again, but to the new endpoint: POST /var HTTP/1.1 Making an HTTP request to the /var endpoint is the same as making a request to the /x endpoint, but without the filter. “And then I saw it and it was beautiful: RewriteRule ^/var /x “After spending some time attempting to bypass the regex and try different payloads, I had a thought… This input filter only triggers when the location matches x.” explained the expert. If the WebAdmin of Sophos SG UTM was exposed only a remote authenticated attacker could easily exploit it. The expert discovered that it was quite easy to trigger this vulnerability, an attacker could exploit the flaw by sending an HTTP request to vulnerable devices. Truth be told I ended up spinning up six different versions, but the two I mentioned were what I ended up comparing in the end.” “I grabbed ISOs for versions 9.510-5 and 9.511-2 of the Sophos UTM platform and spun them up in a lab environment. “When looking for the details on a known patched bug, I started off the same way any sane person would, comparing the differences between an unpatched version and a patched version.” explained the expert in a blog post. Using UTM, your network’s users are protected with several different features, including antivirus, content filtering, email and web filtering, anti-spam, and more.
Utm device how to#
The expert analyzed vulnerable UTM devices used by one of its customers and studied the differences between the patched and unpatched versions of the software to determine how it was fixed and how to exploit the issue. Unified threat management (UTM) refers to when multiple security features or services are combined into a single device within your network. HTTPS scanning is also conspicuous by its absence.Now researcher Justin Kennedy from security consultancy Atredis Partners disclosed technical details about the RCE. Multi-threat security architecture Anti-Virus, Anti-Intrusion & Anti-Spam. It can only tag the subject line of suspect messages so you'll need rules for handling these either on your mail server or at each mail client. Enter the Draytek VigorPro 5510 Unified Threat Management (UTM) Device. There are pros and cons here as no client configuration is necessary but for mail it can't perform quarantining. For the mail and web content filtering services, NetASQ uses transparent proxies. Web browser access isn't available as management is carried out by NetASQ's own Unified Manager, Realtime Monitor and Event Reporter utilities. As the appliance represents a single point of failure, HA is an essential feature and the U6000 supports active/passive configurations.įor deployment the U6000 can route traffic between selected network interfaces, function as a transparent bridge or use a combination of the two. The appliance can support up to 24 network interfaces and the wide range of spare expansion slots allows you to mix copper and fibre. Network connectivity options are extensive as along with two embedded Gigabit ports, the price also includes a quad-port Gigabit card. Power redundancy is also on the menu as the appliance is supplied with a pair of hot-plug supplies. The storage arrangement does look a little dated as the appliance comes with a pair of 73GB Seagate SCSI hard disks configured in a mirror. The hardware package for the U6000 is adequate as this 4U Supermicro rack system is equipped with a single 3GHz Xeon 5160 teamed up with 4GB of memory. ASQ is designed to reduce scanning overheads as it handles all firewall, NAT and VPN functions itself before passing it over to the mail and web proxies so reducing the number of processes required. Central to the appliance is the ASQ (advanced security qualification) engine which runs on a hardened FreeBSD kernel and uses three traffic inspection modes where it watches out for malicious content, employs behavioural and statistical analysis and uses twenty signature databases. The U6000 brings together NetASQ's firewall and IPS capabilities and serves them up with anti-virus, anti-spam and web content filtering services. Another bonus is NetASQ's licensing model as it provides support for unlimited users as standard. NetASQ aims to solve this with its latest U6000 which it claims as the first carrier grade UTM appliance with a maximum throughput of 5Gbps. A major concern for larger businesses is performance as a single appliance handling all security functions has the potential to become a bottleneck. A UTM (Unified Threat Management) appliance, also known as UTM Firewall, is a hardware device that plugs in to corporate network at the network perimeter.
