This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

How was the SQL injection done? We blocked off admin login

We have the admin login only allowing logins from our HQ (IP limited). Yet, they have all been compromised?



This thread was automatically locked due to age.
Parents Reply
  • Hi Paul,

    No I'm not kidding :) Just try it yourself, simple use one of the free online scanners to probe the TCP port 8094 on the WAN-IP of a Sophos XG, eg. https://ping.eu/port-chk/ or https://portchecker.co/ or others.

    It seems that this service is per default always open for any network, no matter if you have the SPX Encryption for email configured or not. And as the release notes shows, this service was vulnerable for "Blind pre-auth SQLi" bevor 17.5 MR12.

    You must actively change the "Allowed networks" in Email -> Encryption -> SPX portal settings! As a work around I've only allowed #Port1 do disable this service on the WAN.

    For me it's now enough. We stopped selling this boxes already bevor two years, but now we will also replace the remaining ones (to another brand).

    bye Josef

    BERGMANN engineering & consulting GmbH, Wien/Austria

Children
  • Hi Paul/Josef;

    The fact is, SPX Portal is open by default. What other flowers are dormant in XG ?

    Regards
    Jan

  • Indeed.  Open.on one firewall.

    Should I expect both MTA mode and legacy mode behave the same ?  I.e. port 8094 open ?

    I have search Sophos web site regarding this, and the fact that port 8094 was always open have already been a major concern to many. 

    Well.  The other work around is to install another firewall between WAN and XG.  I mean, one that does only what it is asked to do.  And do not what it is not asked.  And one that has real log viewer.

    Paul Jr

  • The more I test, the more i'm puzzled.  One of our firewalls test open at one time and closed afterward.  It is not consistent.

    Paul Jr

  • Same here, my home xg (Fullguard Plus license), never used mail system, port is opened because of (ANY), changed to PORT E0 to close. :-(

     

    NOT GOOD

     

    Running SFOS 18.0.0 GA-Build379.HF051220.1

    -----

    Best regards
    Martin

    Sophos XGS 2100 @ Home | Sophos v20 Architect

  • Hello twister5800,

    the same situation in my case.

    Isn't it a best practice firewall policy, in the recommended settings everything is forbidden and the necessary functions are activated by the administrator as needed?

    But it seems that in the case of XG Firewall, on the contrary, everything is allowed and attackers can enter without restriction?!?

    Sarcasm....

    Regards

    alda

  • Hi Alda,

    alda said:

    Isn't it a best practice firewall policy, in the recommended settings everything is forbidden and the necessary functions are activated by the administrator as needed?

    Sarcasm....

    YES - completely agree, I would never buy a big house, not knowing which doors where setup, with no locks :-(

    Now it's like, when you get a new XG device, there is an important note in the box with this link:

    https://nmap.org/book/port-scanning-tutorial.html

    #sarcasm 

    Frustrated and disappointed right now, we stopped selling new fw with UTM and then XG, now customers come to hunt us down. It's been ad very bad year for Sophos with network devices, first broken RED's, CVE's and a multi-bug firewall's...management have forced me to look others ways like Fortinet. A FW need s to be reliable!

    -----

    Best regards
    Martin

    Sophos XGS 2100 @ Home | Sophos v20 Architect