Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Astronomer winks with “temporary spokesman” Gwyneth Paltrow in the viral infamy

Tesla Vet says “reviewing real products, not mockups” is the key to innovative maintenance

Allianz Life says “majority” of customer personal data stolen in a cyber attack

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Sophos and Sonicwall Patches Critical RCE flaws affect firewalls and SMA 100 devices
Identity

Sophos and Sonicwall Patches Critical RCE flaws affect firewalls and SMA 100 devices

userBy userJuly 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 24, 2025Ravi LakshmananNetwork Security/Vulnerabilities

Sophos and Sonic Wall

Sophos and SonicWall warn users of the Sophos Firewall’s critical security flaws and Secure Mobile Access (SMA) 100 Series appliances that can be exploited to achieve remote code execution.

Below is a list of two vulnerabilities affecting the Sophos firewall –

CVE-2025-6704 (CVSS Score: 9.8) – An arbitrary file write vulnerability in the secure PDF exchange (SPX) feature can lead to pre-AUTH remote code execution if certain configurations of SPX are enabled in combination with firewalls running in high availability (HA) mode CVE-2025-7624 (CVSS Score). Legacy (transparent) SMTP proxy can lead to remote code execution if the email quarantine policy is active and SFO is upgraded from a version above 21.0 GA.

Cybersecurity

According to Sophos, CVE-2025-6704 affects about 0.05% of devices, while CVE-2025-7624 affects 0.73% of devices. Both vulnerabilities are addressed along with high strength command injection vulnerabilities in the WebAdmin component (CVE-2025-7382, CVSS score: 8.8).

Also, patching by the company is two other vulnerabilities –

CVE-2024-13974 (CVSS score: 8.1) – A business logic vulnerability in the UP2DATE component could lead to attackers to control the DNS environment of the firewall to achieve remote code execution.

The UK National Cybersecurity Centre (NCSC) is acknowledged to have discovered and reported both CVE-2024-13974 and CVE-2024-13973. The problem affects the next version –

CVE-2024-13974 – Affecting Sophos Firewall V21.0 GA (21.0.0) and old CVE-2024-13973 – Affecting Sophos Firewall V21.0 GA (21.0.0) and old CVE-2025-6704 – Affecting Sophos Firewall v21.5 ga (21.5.025-7625-ga (21.5.0) Sophos Firewall v21.5 Ga (21.5.0) and old CVE-2025-7382 – Affecting Sophos Firewall V21.5 Ga (21.5.0) and Sophos Firewall V21.5 Ga (21.5.0) and Sophos Firewall V21.5 Ga (21.5.0) and Sophos Firewall V21.5 Ga (21.5.0) and Sophos Firewall V21.5 Ga (21.5.0)

SonicWall is disclosed as detailed in the SMA 100 Series Web Management Interface (CVE-2025-40599, CVSS score: 9.1).

The defect affects SMA 100 series products (SMA 210, 410, 500V) and is addressed in versions 10.2.2.1-90SV.

Sonicwall also noted that the vulnerability has not been exploited, but there are potential risks in light of recent reports from the Google Threat Intelligence Group (GTIG).

Cybersecurity

In addition to applying the fix, the company recommends that customers of SMA 100 series devices follow these steps –

Disable remote management access on the externally directed interface (x1) to reduce attack surface, reset all passwords, and reproduce OTP (one-time password) bindings for appliance users and administrators.

Organizations using SMA 100 Series devices are also recommended to check appliance logs and connection history for abnormalities and for indications of unauthorized access.

Organizations using SMA 500V virtual products are required to back up OVA files, export configurations, remove existing virtual machines and all associated virtual disks and snapshots, reinstall new OVAs from SonicWall using a hypervisor, and restore configurations.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSnapchat lets your friends know that you’ve safely made it home
Next Article The Earth is beginning to rotate faster – and scientists are considering doing something unprecedented
user
  • Website

Related Posts

N. The US sanctions company behind the Korean IT scheme. Arizona woman was jailed to run a laptop farm

July 25, 2025

Patchwork targets Turkish defense companies with spear phishing using malicious LNK files

July 25, 2025

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

July 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Astronomer winks with “temporary spokesman” Gwyneth Paltrow in the viral infamy

Tesla Vet says “reviewing real products, not mockups” is the key to innovative maintenance

Allianz Life says “majority” of customer personal data stolen in a cyber attack

Tesla wants to bring Robotaxis to San Francisco. This is what gets in the way.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.