[Note: this post was updated on 15 July 2021 to correct the omission of two resolved issues, on 20 July to advise of potential hardware compatibility issues, and again on 29 July to update a CVE reference]

Email protection features in this release depend on CPU features introduced by Intel and AMD 10-15 years ago.

SG-series appliances and many older end-of-life Sophos appliance models are not affected. Devices running on KVM/QEMU or on hardware with older CPUs may experience issues - consult this article before upgrading.

Today we've released UTM 9.706. The release will be rolled out in phases.

  • In phase 1 you can download the update package from our download server.
  • In phase 2 we will make it available via our Up2Date servers in several stages.
  • In phase 3 we will make it available via our Up2Date servers to all remaining installations.

Up2Date Information

News

  • Maintenance Release
  • Strict TCP Session Handling enabled by default

    New installations of UTM 9.706 have strict TCP session handling enabled by default.
    When updating to 9.706 and strict TCP session handling is not enabled, admins can enable it under Network Protection > Firewall > Advanced.

  • Secure Up2Date

    Up2Date updates will be downloaded via HTTPS connections. In cases where UTM 9 is being used with an upstream proxy or behind a different firewall, it may be necessary to change the configuration on these devices to allow UTM 9 to retrieve Up2Date information via HTTPS.

  • Email Protection anti-spam engine changed to Sophos Anti-Spam Interface (SASI)

    Starting with this release, E-Mail Protection will use the Sophos Anti-Spam Interface (SASI) for anti-spam scanning. SASI is already being used as part of Sophos Email and will replace the currently used anti-spam engine in UTM 9.
    In case of false positive or false negative detections, please follow the instructions in this support article on how to submit a sample.

Remarks

  • System will be rebooted
  • Configuration will be upgraded
  • Connected REDs will perform firmware upgrade
  • Connected Wifi APs will perform firmware upgrade

Issues Resolved

  • NUTM-12050 [Access & Identity] IPv6 auto-firewall rules missing with IPsec S2S respond only

  • NUTM-12062 [Access & Identity] AD Group object not updated when user with an Umlaut in the username logs in

  • NUTM-12188 [Access & Identity] openl2tp service is dead and unable to start

  • NUTM-12198 [Basesystem, UI Framework] Webadmin host injection reported

  • NUTM-11753 [Basesystem] SG450 RAID status not alerting

  • NUTM-11988 [Basesystem] Interface goes down after re-assigning the hardware of an interface

  • NUTM-11989 [Basesystem] BGP issue causes long delay in UTM startup

  • NUTM-12064 [Basesystem] Perl - Vulnerabilities

  • NUTM-12112 [Basesystem] Libc Vulnerabilities

  • NUTM-12122 [Basesystem] net-snmp Vulnerability CVE-2019-20892

  • NUTM-12354 [Basesystem] Patch BIND (CVE-2020-8620 CVE-2020-8621 CVE-2020-8622 CVE-2020-8623 CVE-2020-8624)

  • NUTM-12471 [Basesystem] OpenSSL: CVE-2020-1971 - DoS

  • NUTM-11941 [Email] unnecessary SMTP restarts due to a SSL VPN login

  • NUTM-12286 [Email] ECC Ciphers ECDH-ECDSA not supported by Exim SMTP

  • NUTM-12542 [Email] Arbitrary Config Object Deletion via User Portal

  • NUTM-11915 [Network] Ipsec routes will be removed if a wifi network will be added and the ipsec local networks overlap with an existing wifi network

  • NUTM-12045 [Network] INFO-122 Dhcpd not running

  • NUTM-12280 [RED] RED site-to-site tunnels reconnecting at random intervals (utm to tum)

  • NUTM-12253 [RED_Firmware] Split DNS doesn't work with SD-RED

  • NUTM-12379 [RED_Firmware] RED doesn't reboot after reconnect doesn't work properly

  • NUTM-12098 [UI Framework] Remote crash of User Portal index.plx

  • NUTM-11950 [WAF] AH00051 child pid XXXX exit signal Segmentation fault (11), possible coredump in /tmp

  • NUTM-12148 [WAF] WAF not always sending SNI to backend

  • NUTM-12029 [Web] AWS https scanning connect timeout on some sites with chrome

  • NUTM-12204 [Web] High CPU with http proxy coredumps.

  • NUTM-12032 [Wireless] "&" sign in PSK cause issues after config change

  • NUTM-12127 [Wireless] wireless client list empty

  • NUTM-12254 [Wireless] Website not loading for wireless user due to large packets whose size is larger than the MTU of the link

  • NUTM-12362 [Wireless] AP55/55C/100X/320X : Communication issue for Clients which are connected to the same SSID but at different APs

  • NUTM-12383 [Wireless] All SSIDs disappears from AP and disconnects all connected clients

  • NUTM-12317 [Email] Stored XSS can execute as administrator in quarantined email detail view. (CVE-2021-25273)

  • NUTM-12578 [Email] Pre-auth RCE via Untrusted Deserialization in SPX portal
Parents Comment
  • Hi Remo, 

    We do apply patches to components as vulnerabilities gets disclosed, so just looking at the version # of components is not a good indication whether it's been patched. 

    In this specific example, the OpenSSL running on UTM has been patched against CVE-2020-1971. 

Children