This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

How was the SQL injection done? We blocked off admin login

We have the admin login only allowing logins from our HQ (IP limited). Yet, they have all been compromised?



This thread was automatically locked due to age.
Parents Reply Children
  • I don't think sophos will ever release the proof of concept. I have also been confused over the chmod part which indicates higher privileges but at this point just assume ALL YOUR DATA WAS COMPROMISED on the firewall. 

    I would change ALL PASSWORDS that are locally stored

    I would recreate ALL NEW VPN Tunnels with new keys. 

    Basically everything other than your firewall rules needs to be redone. To be honest, and without a complete audit, its hard to know the severity of a particular compromise. Which parts are saved in the backup of such firewall? So restore from backups that were taken before the breach and then change everything that required a certificate or a password.

    Open source software is pretty safe as most of the code is scrutinized and used all over the world. Only part sophos had to secure was the part that they wrote themselves which is the front-end gui. The saddest part of all this is that without comprehensive logging, we have no idea what the hackers were doing as we can't even tell what internal users are doing most of the time let alone people hammering your firewall from the outside.

    V18 was supposed to be a new beginning and I actually started using XG again as my home firewall. Sadly that ended again with this. 

    Regards

  • Hello

    I changed all keys and passwords.

    That said, the CVE Sophos posted here: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12271, in the description, they write: This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone.

    ... but this is clearly not our case.  What's going on ?

    Paul Jr

  • Is the lan affected on your home unit? Otherwise open a case. Also, how are you coming to the conclusion that your lan computers were accessing those sites? Something in the firewall/web logs?

    I am still not clear on how you came to this conclusion that your internal devices were accessing the sites mentioned by Sophos. If you see some logs, please share if possible

    regards

  • On my Home machine, Sophos indicated the machine was not compromised.  And on the list of 15 ro so WEB sites, at least two have been visited from my LAN.  I have not checked myself, but someone on this blog said they were GoDaddy WEB sites used by thousands of WEB sites hosted there.

    On my business servers, a Sophos Engineer conducted a remote session.  Both servers tagged by Sophos as compromised.  I shown him our WAN access was not open to users or admin, or anyone else.  Again, over the past, some machines have also accessed some of those WEB listed by Sophos.  But the engineer seemed to be interested in only two in particular.

    When the engineer checked, a site that was resolve to 127.0.0.1 wouls not resolve anymore.  Some mechanisms adde by Sophos was now blocking these.  On the Firewall home page, any attempt to acces some of these WEB sites listed would result in an alert indicating an attempt to visit a malicious WEB site.

    Paul Jr