Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution

Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution

Posted on July 22, 2025July 22, 2025 By CWS

A number of safety vulnerabilities affecting Sophos firewall merchandise, with two enabling pre-authentication distant code execution that might enable attackers to compromise methods with out legitimate credentials. 

The vulnerabilities, tracked as CVE-2025-6704, CVE-2025-7624, CVE-2025-7382, CVE-2024-13974, and CVE-2024-13973, affect varied configurations of Sophos Firewall variations 21.5 GA and older, with computerized hotfixes already deployed to handle probably the most extreme flaws.

Key Takeaways1. 5 critical flaws in Sophos Firewall, together with pre-auth distant code execution, have been patched.2. Automated hotfixes defend most customers; no guide motion is required.3. No exploitation detected, however customers ought to verify their firewalls are up to date.

Crucial Pre-Authentication Vulnerabilities 

Probably the most extreme vulnerability, CVE-2025-6704, represents an arbitrary file writing flaw within the Safe PDF eXchange (SPX) function that permits pre-authentication distant code execution. 

This vital vulnerability particularly impacts units operating in Excessive Availability (HA) mode with particular SPX configurations enabled, impacting roughly 0.05% of deployed units. 

Safety researchers found this flaw via Sophos’s bug bounty program and responsibly disclosed it to the corporate.

Equally regarding is CVE-2025-7624, a SQL injection vulnerability within the legacy clear SMTP proxy that may result in distant code execution. 

This vital flaw impacts methods with energetic quarantining insurance policies for e-mail and impacts units upgraded from variations older than SFOS 21.0 GA, doubtlessly affecting as much as 0.73% of deployed firewalls. 

The vulnerability demonstrates how legacy elements can introduce important safety dangers in trendy community infrastructure.

Excessive and Medium Severity Flaws 

Past the vital pre-authentication vulnerabilities, CVE-2025-7382 presents a command injection vulnerability in WebAdmin that permits adjoining attackers to attain pre-authentication code execution on HA auxiliary units. 

This high-severity flaw requires OTP authentication for admin customers to be enabled and impacts roughly 1% of units, highlighting dangers in high-availability configurations.

The CVE-2024-13974 vulnerability exploits enterprise logic flaws within the Up2Date element, permitting attackers to manage the firewall’s DNS surroundings and obtain distant code execution. This high-severity situation was found and disclosed by the UK’s Nationwide Cyber Safety Centre (NCSC). 

Moreover, CVE-2024-13973 represents a post-authentication SQL injection vulnerability in WebAdmin that might allow directors to execute arbitrary code.

CVE IDTitle / DescriptionCVSS 3.1 ScoreSeverityCVE-2025-6704Arbitrary file writing in Safe PDF eXchange (SPX), pre-auth distant code execution possible9.8CriticalCVE-2025-7624SQL injection in legacy clear SMTP proxy, pre-auth distant code execution possible9.8CriticalCVE-2025-7382Command injection in WebAdmin, adjoining pre-auth code execution on HA auxiliary devices8.8HighCVE-2024-13974Business logic flaw in Up2Date, distant code execution by way of DNS control8.2HighCVE-2024-13973Post-auth SQL injection in WebAdmin, arbitrary code execution for administrators6.6Medium

Mitigations

Sophos has carried out a multi-phase hotfix deployment technique, with vital vulnerabilities receiving precedence therapy. 

Organizations with computerized hotfix set up enabled obtain these patches robotically, representing the default configuration. 

Sophos has confirmed no proof of energetic exploitation for any of those vulnerabilities. 

Customers operating supported variations together with 19.0 MR2, 20.0 MR2/MR3, and 21.0 GA variants ought to confirm hotfix utility via Sophos assist documentation to make sure complete safety towards these vital safety flaws.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:Code, Critical, Enables, Execution, Firewall, PreAuth, Remote, Sophos, Vulnerabilities

Post navigation

Previous Post: Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate
Next Post: Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access

Related Posts

Top Spam Filter Tools for 2026: A Comprehensive Guide Top Spam Filter Tools for 2026: A Comprehensive Guide Cyber Security News
Hackers Target Android Users with Fake App Testing Invites Hackers Target Android Users with Fake App Testing Invites Cyber Security News
Ollama Vulnerability Exposes Servers to Data Leaks Ollama Vulnerability Exposes Servers to Data Leaks Cyber Security News
MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules Cyber Security News
Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks Cyber Security News
Global Crackdown on Crimenetwork Reveals Thousands of Users Global Crackdown on Crimenetwork Reveals Thousands of Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark