Sophos Connect v2.2 MR1 Resolves Security Vulnerabilities

Sophos Security Advisory

Sophos Connect v2.2 MR1 Resolves Security Vulnerabilities
MoritzGrimm

Summary

Overview

The Sophos Connect client v2.2 MR1 (2.2.90) release fixes the following security issues (users of older versions are required to upgrade.)

CVE IDDescriptionSeverity
CVE-2022-48309A CSRF vulnerability allowing malicious websites to retrieve logs and technical support archives was discovered and responsibly disclosed to Sophos by an external security researcher via the Sophos bug bounty program.

Sophos would like to thank Mario Melcher – Information Security Professional at SEITENBAU GmbH – for responsibly disclosing this issue to Sophos.

MEDIUM
CVE-2022-48310An information disclosure vulnerability allowing sensitive key material to be included in technical support archives was discovered and responsibly disclosed to Sophos by an external security researcher via the Sophos bug bounty program.

Sophos would like to thank Mario Melcher – Information Security Professional at SEITENBAU GmbH – for responsibly disclosing this issue to Sophos.

MEDIUM
CVE-2022-4901Multiple stored XSS vulnerabilities allowing execution of Javascript code in the local UI were discovered and responsibly disclosed to Sophos by an external security researcher via the Sophos bug bounty program. The victim must be tricked into manually loading a malicious VPN configuration file for the attack to succeed.LOW

Notes

  • Action required: Sophos strongly advises upgrading immediately as the CSRF and information disclosure vulnerabilities (CVE-2022-48309 and CVE-2022-48310) compound each other
  • Sophos always recommends that Sophos Connect users upgrade to the latest release at their earliest opportunity
Severity
Medium
First Published
Updated
Publication ID
sophos-sa-20230301-scc-csrf
Workaround
No
Sophos Connect Client 2.0
CVE-2022-48309
CVE-2022-48310
CVE-2022-4901
Article Version
1

READ MORE