Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Vulnerabilities Patched in Sophos Firewall

Posted on July 23, 2025July 23, 2025 By CWS

Sophos this week introduced the rollout of patches for 5 vulnerabilities in Sophos Firewall that might result in distant code execution (RCE).

The primary problem, tracked as CVE-2025-6704 (CVSS rating of 9.8), is a essential arbitrary file writing flaw within the Safe PDF eXchange (SPX) characteristic of the equipment that might enable distant, unauthenticated attackers to execute arbitrary code.

In accordance with Sophos’s advisory, the bug impacts solely a fraction of firewall deployments, as it might probably solely be triggered if a particular configuration of SPX is enabled and if the firewall is working in Excessive Availability (HA) mode.

The second defect, tracked as CVE-2025-7624 (CVSS rating of 9.8), is an SQL injection problem within the legacy SMTP proxy of the equipment.

Additionally resulting in RCE, the vulnerability solely happens “if a quarantining coverage is energetic for E-mail and SFOS was upgraded from a model older than 21.0 GA”. Thus, it impacts lower than 1% of gadgets, Sophos says.

The corporate additionally resolved a high-severity command injection bug within the WebAdmin part of the firewall that might enable distant, unauthenticated attackers to execute arbitrary code on Excessive Availability (HA) auxiliary gadgets.

Tracked as CVE-2025-7382 (CVSS rating of 8.8), the flaw can solely be triggered if OTP authentication for the admin consumer is enabled.

Over the previous month, Sophos launched hotfixes to deal with these points in Firewall variations 19.0 MR2 (19.0.2.472), 20.0 MR2 (20.0.2.378), 20.0 MR3 (20.0.3.427), 21.0 GA (21.0.0.169), 21.0 MR1 (21.0.1.237), 21.0 MR1-1 (21.0.1.272), 21.0 MR1-2 (21.0.1.277), and 21.5 GA (21.5.0.171).Commercial. Scroll to proceed studying.

The patches had been additionally included in model 21.0 MR2 of the equipment.

The final two bugs described in Sophos’ advisory, CVE-2024-13974 and CVE-2024-13973, had been found within the equipment’s Up2Date and WebAdmin elements. Their exploitation requires that the attackers management the firewall’s DNS setting and that they’re logged in as directors, respectively.

Patches for these safety defects had been first included in Sophos Firewall model 21.0 MR1.

Prospects working older variations of the firewall are required to improve to obtain these patches, the corporate says. Sophos notes that it has not noticed these flaws being exploited within the wild.

Associated: Sophos Patches Essential Firewall Vulnerabilities

Associated: Oracle Patches 200 Vulnerabilities With July 2025 CPU

Associated: ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact

Associated: Unpatched Ruckus Vulnerabilities Enable Wi-fi Atmosphere Hacking

Security Week News Tags:Critical, Firewall, Patched, Sophos, Vulnerabilities

Post navigation

Previous Post: High-Severity Flaws Patched in Chrome, Firefox
Next Post: Firefox 141 Released With Fix for Multiple Vulnerabilities

Related Posts

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks Security Week News
Microsoft 365 Direct Send Abused for Phishing Security Week News
Victoria’s Secret Website Taken Offline After Cyberattack Security Week News
Chinese Spies Target Networking and Virtualization Flaws to Breach Isolated Environments Security Week News
Orange Belgium Data Breach Impacts 850,000 Customers Security Week News
Google Project Zero Tackles Upstream Patch Gap With New Policy Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News