HomeCyber SecuritySophos and SonicWall Patch Important RCE Flaws Affecting Firewalls and SMA 100...

Sophos and SonicWall Patch Important RCE Flaws Affecting Firewalls and SMA 100 Gadgets


Jul 24, 2025Ravie LakshmananCommunity Safety / Vulnerability

Sophos and SonicWall Patch Important RCE Flaws Affecting Firewalls and SMA 100 Gadgets

Sophos and SonicWall have alerted customers of essential safety flaws in Sophos Firewall and Safe Cellular Entry (SMA) 100 Sequence home equipment that might be exploited to attain distant code execution.

The 2 vulnerabilities impacting Sophos Firewall are listed beneath –

  • CVE-2025-6704 (CVSS rating: 9.8) – An arbitrary file writing vulnerability within the Safe PDF eXchange (SPX) function can result in pre-auth distant code execution, if a particular configuration of SPX is enabled together with the firewall operating in Excessive Availability (HA) mode
  • CVE-2025-7624 (CVSS rating: 9.8) – An SQL injection vulnerability within the legacy (clear) SMTP proxy can result in distant code execution, if a quarantining coverage is lively for E mail and SFOS was upgraded from a model older than 21.0 GA
Cybersecurity

Sophos mentioned CVE-2025-6704 impacts about 0.05% of units, whereas CVE-2025-7624 impacts as many as 0.73% of units. Each vulnerabilities have been addressed alongside a high-severity command injection vulnerability within the WebAdmin part (CVE-2025-7382, CVSS rating: 8.8) that would end in pre-auth code execution on Excessive Availability (HA) auxiliary units, if OTP authentication for the admin person is enabled.

Additionally patched by the corporate are two different vulnerabilities –

  • CVE-2024-13974 (CVSS rating: 8.1) – A enterprise logic vulnerability within the Up2Date part can result in attackers controlling the firewall’s DNS surroundings to attain distant code execution
  • CVE-2024-13973 (CVSS rating: 6.8) – A post-auth SQL injection vulnerability in WebAdmin can doubtlessly result in directors reaching arbitrary code execution

The U.Okay. Nationwide Cyber Safety Centre (NCSC) has been credited with discovering and reporting each CVE-2024-13974 and CVE-2024-13973. The problems have an effect on the next variations –

  • CVE-2024-13974 – Impacts Sophos Firewall v21.0 GA (21.0.0) and older
  • CVE-2024-13973 – Impacts Sophos Firewall v21.0 GA (21.0.0) and older
  • CVE-2025-6704 – Impacts Sophos Firewall v21.5 GA (21.5.0) and older
  • CVE-2025-7624 – Impacts Sophos Firewall v21.5 GA (21.5.0) and older
  • CVE-2025-7382 – Impacts Sophos Firewall v21.5 GA (21.5.0) and older

The disclosure comes as SonicWall detailed a essential bug within the SMA 100 Sequence net administration interface (CVE-2025-40599, CVSS rating: 9.1) {that a} distant attacker with administrative privileges can exploit to add arbitrary recordsdata and doubtlessly obtain distant code execution.

The flaw impacts SMA 100 Sequence merchandise (SMA 210, 410, 500v) and has been addressed in model 10.2.2.1-90sv.

SonicWall additionally identified that whereas the vulnerability has not been exploited, there exists a possible threat in gentle of a current report from the Google Risk Intelligence Group (GTIG), which discovered proof of a menace actor dubbed UNC6148 leveraging fully-patched SMA 100 collection units to deploy a backdoor referred to as OVERSTEP.

Cybersecurity

Moreover making use of the fixes, the corporate can also be recommending that prospects of SMA 100 Sequence units perform the next steps –

  • Disable distant administration entry on the external-facing interface (X1) to scale back the assault floor
  • Reset all passwords and reinitialize OTP (One-Time Password) binding for customers and directors on the equipment
  • Implement multi-factor authentication (MFA) for all customers
  • Allow Net Utility Firewall (WAF) on SMA 100

Organizations utilizing SMA 100 Sequence units are additionally suggested to evaluation equipment logs and connection historical past for anomalies and verify for any indicators of unauthorized entry.

Organizations utilizing the SMA 500v digital product are required to backup the OVA file, export the configuration, take away the present digital machine and all related digital disks and snapshots, reinstall the brand new OVA from SonicWall utilizing a hypervisor, and restore the configuration.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments