First published: Thu Dec 19 2024(Updated: )
A pre-auth SQL injection vulnerability in the email protection feature of Sophos Firewall versions older than 21.0 MR1 (21.0.1) allows access to the reporting database and can lead to remote code execution if a specific configuration of Secure PDF eXchange (SPX) is enabled in combination with the firewall running in High Availability (HA) mode.
Credit: security-alert@sophos.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sophos Firewall Firmware | <21.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12727 is considered critical due to the potential for remote code execution.
To fix CVE-2024-12727, upgrade Sophos Firewall to version 21.0.1 or later.
CVE-2024-12727 affects the email protection feature of Sophos Firewall.
Exploitation of CVE-2024-12727 can lead to unauthorized access to the reporting database.
Sophos Firewall versions prior to 21.0 MR1 (21.0.1) are vulnerable to CVE-2024-12727.