CVE-2025-7382: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sophos Sophos Firewall
A command injection vulnerability in WebAdmin of Sophos Firewall versions older than 21.0 MR2 (21.0.2) can lead to adjacent attackers achieving pre-auth code execution on High Availability (HA) auxiliary devices, if OTP authentication for the admin user is enabled.
AI Analysis
Technical Summary
CVE-2025-7382 is a high-severity command injection vulnerability affecting the WebAdmin interface of Sophos Firewall versions prior to 21.0 MR2 (21.0.2). This vulnerability specifically impacts the High Availability (HA) auxiliary devices when the admin user has One-Time Password (OTP) authentication enabled. An adjacent attacker—meaning one with network access to the HA auxiliary device but not necessarily authenticated—can exploit this flaw to execute arbitrary code without any authentication or user interaction. The vulnerability arises from improper input validation in the WebAdmin component, allowing command injection that leads to full code execution capabilities. The CVSS v3.1 base score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, combined with the ease of exploitation (low attack complexity, no privileges or user interaction required). Although no known exploits are currently reported in the wild, the potential for pre-auth remote code execution on firewall devices—critical network security infrastructure—makes this a significant threat. The lack of a patch link in the provided data suggests that remediation may be pending or that users must obtain updates directly from Sophos. Given the firewall's role in perimeter defense, exploitation could allow attackers to bypass security controls, intercept or manipulate network traffic, and disrupt network availability.
Potential Impact
For European organizations, this vulnerability poses a substantial risk due to the widespread use of Sophos Firewall in enterprise and governmental networks across the region. Successful exploitation could lead to full compromise of firewall devices, resulting in unauthorized access to internal networks, data exfiltration, and potential lateral movement within critical infrastructure. The ability to execute code pre-authentication on HA auxiliary devices is particularly concerning because these devices often serve as failover or load balancing nodes, and their compromise could undermine network resilience and continuity. Sensitive sectors such as finance, healthcare, telecommunications, and government agencies in Europe rely heavily on robust firewall protections; thus, this vulnerability could facilitate espionage, sabotage, or ransomware attacks. Additionally, the requirement for OTP authentication to be enabled on the admin user suggests that even organizations with enhanced security measures are at risk, highlighting the need for urgent patching and mitigation. The absence of known exploits in the wild provides a window for proactive defense, but the high CVSS score indicates that attackers will likely target this vulnerability once exploit code becomes available.
Mitigation Recommendations
European organizations should immediately verify their Sophos Firewall versions and upgrade to version 21.0 MR2 (21.0.2) or later where this vulnerability is addressed. If immediate patching is not feasible, organizations should restrict network access to the WebAdmin interface and HA auxiliary devices to trusted management networks only, using network segmentation and firewall rules to limit exposure. Disabling OTP authentication temporarily on admin accounts, if feasible, may reduce the attack surface, but this should be balanced against the security benefits of OTP. Monitoring firewall logs for unusual activity and implementing intrusion detection systems to detect command injection attempts can provide early warning. Organizations should also review and harden administrative access policies, including strong password enforcement and multi-factor authentication methods beyond OTP if possible. Regular backups of firewall configurations and system states should be maintained to enable rapid recovery in case of compromise. Finally, organizations should engage with Sophos support channels to obtain official patches and guidance, and stay alert for any emerging exploit reports or indicators of compromise related to this vulnerability.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-7382: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sophos Sophos Firewall
Description
A command injection vulnerability in WebAdmin of Sophos Firewall versions older than 21.0 MR2 (21.0.2) can lead to adjacent attackers achieving pre-auth code execution on High Availability (HA) auxiliary devices, if OTP authentication for the admin user is enabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-7382 is a high-severity command injection vulnerability affecting the WebAdmin interface of Sophos Firewall versions prior to 21.0 MR2 (21.0.2). This vulnerability specifically impacts the High Availability (HA) auxiliary devices when the admin user has One-Time Password (OTP) authentication enabled. An adjacent attacker—meaning one with network access to the HA auxiliary device but not necessarily authenticated—can exploit this flaw to execute arbitrary code without any authentication or user interaction. The vulnerability arises from improper input validation in the WebAdmin component, allowing command injection that leads to full code execution capabilities. The CVSS v3.1 base score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, combined with the ease of exploitation (low attack complexity, no privileges or user interaction required). Although no known exploits are currently reported in the wild, the potential for pre-auth remote code execution on firewall devices—critical network security infrastructure—makes this a significant threat. The lack of a patch link in the provided data suggests that remediation may be pending or that users must obtain updates directly from Sophos. Given the firewall's role in perimeter defense, exploitation could allow attackers to bypass security controls, intercept or manipulate network traffic, and disrupt network availability.
Potential Impact
For European organizations, this vulnerability poses a substantial risk due to the widespread use of Sophos Firewall in enterprise and governmental networks across the region. Successful exploitation could lead to full compromise of firewall devices, resulting in unauthorized access to internal networks, data exfiltration, and potential lateral movement within critical infrastructure. The ability to execute code pre-authentication on HA auxiliary devices is particularly concerning because these devices often serve as failover or load balancing nodes, and their compromise could undermine network resilience and continuity. Sensitive sectors such as finance, healthcare, telecommunications, and government agencies in Europe rely heavily on robust firewall protections; thus, this vulnerability could facilitate espionage, sabotage, or ransomware attacks. Additionally, the requirement for OTP authentication to be enabled on the admin user suggests that even organizations with enhanced security measures are at risk, highlighting the need for urgent patching and mitigation. The absence of known exploits in the wild provides a window for proactive defense, but the high CVSS score indicates that attackers will likely target this vulnerability once exploit code becomes available.
Mitigation Recommendations
European organizations should immediately verify their Sophos Firewall versions and upgrade to version 21.0 MR2 (21.0.2) or later where this vulnerability is addressed. If immediate patching is not feasible, organizations should restrict network access to the WebAdmin interface and HA auxiliary devices to trusted management networks only, using network segmentation and firewall rules to limit exposure. Disabling OTP authentication temporarily on admin accounts, if feasible, may reduce the attack surface, but this should be balanced against the security benefits of OTP. Monitoring firewall logs for unusual activity and implementing intrusion detection systems to detect command injection attempts can provide early warning. Organizations should also review and harden administrative access policies, including strong password enforcement and multi-factor authentication methods beyond OTP if possible. Regular backups of firewall configurations and system states should be maintained to enable rapid recovery in case of compromise. Finally, organizations should engage with Sophos support channels to obtain official patches and guidance, and stay alert for any emerging exploit reports or indicators of compromise related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Sophos
- Date Reserved
- 2025-07-09T09:26:15.788Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 687e4119a83201eaac0fbb9a
Added to database: 7/21/2025, 1:31:05 PM
Last enriched: 7/21/2025, 1:46:21 PM
Last updated: 8/27/2025, 2:24:15 PM
Views: 38
Related Threats
CVE-2025-0878: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Akinsoft LimonDesk
MediumCVE-2025-3701: CWE-862 Missing Authorization in Malcure Web Security Malcure Malware Scanner
MediumCVE-2025-9901: Use of Cache Containing Sensitive Information in Red Hat Red Hat Enterprise Linux 10
MediumCVE-2025-53694: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Sitecore Sitecore Experience Manager (XM)
HighCVE-2025-53693: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in Sitecore Sitecore Experience Manager (XM)
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.