Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Embedded Server/Appliance)  >   Sophos UTM (Astaro Security Gateway) Vendors:   Astaro, Sophos
Sophos UTM Authentication Flaw in 'confd' Service Lets Remote Authenticated Users Gain Elevated Privileges
SecurityTracker Alert ID:  1040445
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 5 2018
Impact:   Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   A vulnerability was reported in Sophos UTM. A remote authenticated user can gain elevated privileges.

A remote authenticated 'loginuser' account user can access the 'confd' service via the localhost interface to obtain a session token and then use the session token to submit a specially crafted request via the network to '/webadmin.plx' to set the root password on the target system.

The vendor was notified on July 21, 2017.

The original advisory is available at:

Matt Bergin (@thatguylevel) of KoreLogic, Inc. reported this vulnerability.

Impact:   A remote authenticated user can gain root privileges on the target system.
Solution:   The vendor has issued a fix (9.508).

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Authentication error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC