{"id":238809,"date":"2020-12-11T19:06:05","date_gmt":"2020-12-11T18:06:05","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=238809"},"modified":"2024-02-19T07:50:24","modified_gmt":"2024-02-19T06:50:24","slug":"sophos-behebt-sql-injection-schwachstelle-in-cyberoam-os","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2020\/12\/11\/sophos-behebt-sql-injection-schwachstelle-in-cyberoam-os\/","title":{"rendered":"Sophos behebt SQL-Injection-Schwachstelle in Cyberoam OS"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2020\/12\/11\/sophos-behebt-sql-injection-schwachstelle-in-cyberoam-os\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Hinweis f\u00fcr Leute, die Sophos Firewalls oder \u00e4hnliches mit Cyberoam OS im Einsatz haben. Sophos hat einen Hotfix f\u00fcr seine Cyberoam Firewalls und Router bereitgestellt, um eine SQL-Injection-Schwachstelle zu beheben.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg05.met.vgwort.de\/na\/13e437fbe9364cc2bb80c8d6c006cb04\" alt=\"\" width=\"1\" height=\"1\" \/>Sophos hat den Firewall- und Router-Hersteller Cyberoam Technologies im Jahr 2014 gekauft und bietet seit 2019 kostenlose Upgrades f\u00fcr sein XG Firewall OS an.<\/p>\n<h2>SQL-Injection-Schwachstelle in Cyberoam OS<\/h2>\n<p>In <a href=\"https:\/\/web.archive.org\/web\/20201211103332\/https:\/\/support.sophos.com\/support\/s\/article\/KB-000040678?language=en_US\" target=\"_blank\" rel=\"noopener\">einem Sicherheitshinweis<\/a> informiert Sophos \u00fcber eine SQL-Injection-Schwachstelle in Cyberoam OS und schreibt dazu:<\/p>\n<blockquote><p>A pre-authentication SQL injection vulnerability was recently discovered and fixed on Cyberoam operating system (CROS) devices. This type of vulnerability could allow SQL statements to be executed remotely, but only if the administration interface (HTTPS admin service) was exposed on the WAN zone. No other Sophos products were affected.<\/p><\/blockquote>\n<p>Eine vor der Authentifizierung ausnutzbare SQL-Injection-Schwachstelle wurde k\u00fcrzlich auf Ger\u00e4ten mit Cyberoam-Betriebssystem (CROS) entdeckt und behoben. Diese Art von Schwachstelle k\u00f6nnte die Remote-Ausf\u00fchrung von SQL-Anweisungen erm\u00f6glichen, allerdings nur, wenn die Administrationsschnittstelle (HTTPS-Admin-Dienst) in der WAN-Zone offengelegt wurde. Es waren keine anderen Sophos Produkte betroffen.<\/p>\n<h2>Hotfix Informationen f\u00fcr diverse CROS-Versionen:<\/h2>\n<p>F\u00fcr folgende CROS-Versionen sind Hotfixes verf\u00fcgbar:<\/p>\n<ul>\n<li>Version 10.6.4 and above (4. Dezember 2020)<\/li>\n<li>Version 10.6.3 MR4 &amp; MR5, 10.6.2 MR1 (5. Dezember 2020)<br \/>\n<b>Note<\/b>: Unsupported version &#8211; Please upgrade to the latest CROS version or to our next-gen <a href=\"https:\/\/web.archive.org\/web\/20240103062250\/https:\/\/docs.sophos.com\/nsg\/sophos-firewall\/migration\/Cyberoam%20OS%20to%20Sophos%20Firewall%20OS%20Upgrade%20Guide.pdf\" target=\"_blank\" rel=\"noopener\">XG Firewall for advanced security, performance, and protection<\/a><\/li>\n<li>All versions prior to and including 10.6.1 : N\/A<br \/>\n<b>Note<\/b>: Unsupported version &#8211; Please upgrade to the latest CROS version or to our next-gen <a href=\"https:\/\/web.archive.org\/web\/20240103062250\/https:\/\/docs.sophos.com\/nsg\/sophos-firewall\/migration\/Cyberoam%20OS%20to%20Sophos%20Firewall%20OS%20Upgrade%20Guide.pdf\">XG Firewall for advanced security, performance, and protection<\/a><\/li>\n<\/ul>\n<p>Im <a href=\"https:\/\/web.archive.org\/web\/20201211103332\/https:\/\/support.sophos.com\/support\/s\/article\/KB-000040678?language=en_US\" target=\"_blank\" rel=\"noopener\">Sicherheitshinweis<\/a> informiert Sophos, wie man sicherstellen kann, dass der Hotfix installiert wird. Bleeping Computer hat <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sophos-fixes-sql-injection-vulnerability-in-their-cyberoam-os\/\" target=\"_blank\" rel=\"noopener\">hier<\/a> noch einige Informationen ver\u00f6ffentlicht.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Hinweis f\u00fcr Leute, die Sophos Firewalls oder \u00e4hnliches mit Cyberoam OS im Einsatz haben. Sophos hat einen Hotfix f\u00fcr seine Cyberoam Firewalls und Router bereitgestellt, um eine SQL-Injection-Schwachstelle zu beheben.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[731,426],"tags":[3081,4328],"class_list":["post-238809","post","type-post","status-publish","format-standard","hentry","category-gerate","category-sicherheit","tag-geraete","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/238809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=238809"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/238809\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=238809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=238809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=238809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}