This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Anyone else not yet received latest versions?

Our Intercept X version is currently 2.0.22 and our Core Agent is 2.20.4.1 yet despite being assured we'd receive the latest versions "at some point in January" we do not appear to have yet received them.

Updates both from our local Cache servers or direct from Sophos do not appear to be pushing down the latest versions.

We're UK-based, not using any "Controlled Updates" settings and are not members of the EAP - anyone else still waiting?  We need the latest versions for compliance reasons.



This thread was automatically locked due to age.
Parents Reply Children
  • I think I have something here:

    https://www.ncsc.gov.uk/files/Cyber-Essentials-Plus-Illustrative-technical-specification-2-2.pdf

    Using the output of the scan, identify vulnerabilities that are high risk or security critical, as defined by the following CVSS v3 parameters:

    • attack vector: network only

    • attack complexity: low only

    • privileges required: none only

    • user interaction: none only

    • exploit code maturity: functional or high

    • report confidence: confirmed or high

    If there are any vulnerabilities which meet the above criteria, and for which the vendor provided patch has been available for more than 14 days prior to testing, record a Fail result for the sub-test. Otherwise, record a Pass result.

    It also has in Test case 3:

    Sub-test 3.1 (for EUDs that use antivirus software) For each EUD in the sample set, check that:

    • all antivirus definitions released within the 24 hours prior to testing have been installed

    • all antivirus engine updates released within the 30 days prior to testing have been installed

    and I also found this comment on it:

    https://www.ncsc.gov.uk/blog-post/cyber-essentials-it-isnt-a-risky-business

    -

    Example 2: Security updates
    My second example relates to the technical specification which requires that organisations apply security updates (also known as patching) within 14 days, where the vendor defines the severity as ‘critical’ or ‘high risk.’

    This is probably the one requirement that attracts the most debate! It’s always worth reiterating the scope of the assessment, which is:

    “Any device that accepts incoming network connections from untrusted Internet-connected hosts; establishes user-initiated outbound connections to arbitrary devices via the Internet; or controls the flow of data between any of the above devices and the Internet.“

    I always like to reiterate the scope of the assessment, as it clearly influences what must meet the 14-day update requirement and what should meet it.

    It’s easy to say “update within 14 days” but for many, this is challenging. Even so, we have 60,000 certificates issued to companies big and small who, to their credit, have managed to achieve this. That said, I’m starting to hear of cases where the 14 day rule has not been applied consistently in the past.

    As companies are coming forward to be re-certified, it’s clear that their previous assessment took a more risk managed approach and allowed for updating beyond the 14 days. That has never been allowed within the requirements, so I would expect the Certification Bodies to follow the requirements laid down in the standard.

    -

    So it seems that as long as detection identities are being installed with 24 hours and engine updates are in 30 days, general product updating is fine.  It's only where there is a vulnerability in the software and the update is to resolve that does it need to be updated to the version that fixes it in 14 days?

  • Our organisation is certified under the 'CyberEssentials Plus' certification and we always stick to the 14 day rule when it comes to BIOS, Firmware and software-based security updates. 

    In our case, specifically with Sophos, we needed to address this issue Sophos Central Intercept X, Central Server Intercept X Advanced and Sophos Exploit Prevention cumulative hotfix which has been addressed satisfactorily now our machines have installed the 2.0.24 update of Intercept X 

    I believe our assessors use Latest version of Sophos products to determine latest Sophos versions but I am not sure entirely, and other assessors may use other sources.

  • Thanks, so that one does make more sense given it's a security vulnerability with a CVE.  It does bring up an interesting question as to what up to date means and what the comparison considers. 

    As I say, you could drop Sophos Support an email asking to be placed in a latter deployment group, I believe there are 3 at the last time I asked.