SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Sophos UTM (Astaro Security Gateway) Vendors:   Astaro, Sophos
Sophos UTM Authentication Flaw in 'confd' Service Lets Remote Authenticated Users Gain Elevated Privileges
SecurityTracker Alert ID:  1040445
SecurityTracker URL:  http://securitytracker.com/id/1040445
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 5 2018
Impact:   Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   A vulnerability was reported in Sophos UTM. A remote authenticated user can gain elevated privileges.

A remote authenticated 'loginuser' account user can access the 'confd' service via the localhost interface to obtain a session token and then use the session token to submit a specially crafted request via the network to '/webadmin.plx' to set the root password on the target system.

The vendor was notified on July 21, 2017.

The original advisory is available at:

https://www.korelogic.com/Resources/Advisories/KL-001-2018-007.txt

Matt Bergin (@thatguylevel) of KoreLogic, Inc. reported this vulnerability.

Impact:   A remote authenticated user can gain root privileges on the target system.
Solution:   The vendor has issued a fix (9.508).

The vendor advisory is available at:

https://community.sophos.com/products/unified-threat-management/b/utm-blog/posts/utm-up2date-9-508-released

Vendor URL:  community.sophos.com/products/unified-threat-management/b/utm-blog/posts/utm-up2date-9-508-released (Links to External Site)
Cause:   Authentication error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC