Cyber-security firm Sophos has published an emergency security update on Saturday to patch a zero-day vulnerability in its XG enterprise firewall product that was being abused in the wild by hackers.
Sophos said it first learned of the zero-day on late Wednesday, April 22, after it received a report from one of its customers. The customer reported seeing “a suspicious field value visible in the management interface.”
After investigating the report, Sophos determined this was an active attack and not an error in its product.
HACKERS ABUSED AN SQL INJECTION BUG TO STEAL PASSWORDS
“The attack used a previously unknown SQL injection vulnerability to gain access to exposed XG devices,” Sophos said today.
Hackers targeted Sophos XG Firewall devices that had their administration (HTTPS service) or the User Portal control panel exposed on the internet.
Sophos said the hackers used the SQL injection vulnerability to download a payload on the device. This payload then stole files from the XG Firewall.
Stolen data could include usernames and hashed passwords for the firewall device admin, for the firewall portal admins, and user accounts used for remote access to the device.
Sophos said that passwords for customers’ other external authentication systems, such as AD or LDAP, were unaffected.
The company said that during its investigation, it did not find any evidence that hackers used the stolen passwords to access XG Firewall devices, or anything beyond the firewall, on its customers’ internal networks.
PATCH ALREADY PUSHED TO CUSTOMER DEVICES
The UK company, famed for its antivirus product, said it prepared and already pushed an automatic update to patch all XG Firewalls that have the auto-update feature enabled.
“This hotfix eliminated the SQL injection vulnerability which prevented further exploitation, stopped the XG Firewall from accessing any attacker infrastructure, and cleaned up any remnants from the attack,” it said.
The security update will also add a special box in the XG Firewall control panel to let device owners know if their device has been compromised.
For companies that had devices hacked, Sophos is recommending a series of steps, which include password resets and device reboots:
- Reset portal administrator and device administrator accounts
- Reboot the XG device(s)
- Reset passwords for all local user accounts
- Although the passwords were hashed, it is recommended that passwords are reset for any accounts where the XG credentials might have been reused
Sophos also recommends that companies disable the firewall’s administration interfaces on the internet-facing ports if they don’t need the feature