Sophos
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Sophos product.
RSS Feeds for Sophos security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Sophos products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Sophos Sorted by Most Security Vulnerabilities since 2018
Known Exploited Sophos Vulnerabilities
The following Sophos vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| Sophos XG Firewall Buffer Overflow Vulnerability |
Sophos XG Firewall contains a buffer overflow vulnerability that allows for remote code execution via the "HTTP/S bookmark" feature. CVE-2020-15069 Exploit Probability: 82.6% |
February 6, 2025 |
| CyberoamOS (CROS) SQL Injection Vulnerability |
CyberoamOS (CROS) contains a SQL injection vulnerability in the WebAdmin that allows an unauthenticated attacker to execute arbitrary SQL statements remotely. CVE-2020-29574 Exploit Probability: 8.4% |
February 6, 2025 |
| Sophos Web Appliance Command Injection Vulnerability |
Sophos Web Appliance contains a command injection vulnerability in the warn-proceed handler that allows for remote code execution. CVE-2023-1671 Exploit Probability: 94.3% |
November 16, 2023 |
| Sophos Firewall Code Injection Vulnerability |
A code injection vulnerability in the User Portal and Webadmin of Sophos Firewall allows for remote code execution. CVE-2022-3236 Exploit Probability: 93.1% |
September 23, 2022 |
| Sophos Firewall Authentication Bypass Vulnerability |
An authentication bypass vulnerability in User Portal and Webadmin of Sophos Firewall allows for remote code execution. CVE-2022-1040 Exploit Probability: 94.4% |
March 31, 2022 |
| Sophos SG UTM Remote Code Execution Vulnerability |
A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM. CVE-2020-25223 Exploit Probability: 94.4% |
March 25, 2022 |
| Sophos XG Firewall SQL Injection Vulnerability |
A SQL injection issue that causes affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. CVE-2020-12271 Exploit Probability: 88.9% |
November 3, 2021 |
Of the known exploited vulnerabilities above, 6 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings.
By the Year
In 2026 there have been 0 vulnerabilities in Sophos. Last year, in 2025 Sophos had 2 security vulnerabilities published. Right now, Sophos is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 2 | 7.80 |
| 2024 | 2 | 0.00 |
| 2023 | 10 | 6.28 |
| 2022 | 15 | 7.13 |
| 2021 | 7 | 6.34 |
| 2020 | 8 | 8.53 |
| 2019 | 0 | 0.00 |
| 2018 | 15 | 7.34 |
It may take a day or so for new Sophos vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Sophos Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-6704 | Jul 21, 2025 |
Sophos Firewall <21.0.2 SPX ARW pre-auth RCEAn arbitrary file writing vulnerability in the Secure PDF eXchange (SPX) feature of Sophos Firewall versions older than 21.0 MR2 (21.0.2) can lead to pre-auth remote code execution, if a specific configuration of SPX is enabled in combination with the firewall running in High Availability (HA) mode. |
|
| CVE-2024-13861 | Apr 11, 2025 |
Taegis Endpoint Agent <1.3.10 Local Code Injection (root exploit) on DebianA code injection vulnerability in the Debian package component of Taegis Endpoint Agent (Linux) versions older than 1.3.10 allows local users arbitrary code execution as root. Redhat-based systems using RPM packages are not affected. |
|
| CVE-2024-12729 | Dec 19, 2024 |
Sophos Firewall User Portal Remote Code Execution VulnerabilityA post-auth code injection vulnerability in the User Portal allows authenticated users to execute code remotely in Sophos Firewall older than version 21.0 MR1 (21.0.1). |
|
| CVE-2024-12727 | Dec 19, 2024 |
Sophos Firewall SQL Injection Vulnerability in Email Protection FeatureA pre-auth SQL injection vulnerability in the email protection feature of Sophos Firewall versions older than 21.0 MR1 (21.0.1) allows access to the reporting database and can lead to remote code execution if a specific configuration of Secure PDF eXchange (SPX) is enabled in combination with the firewall running in High Availability (HA) mode. |
|
| CVE-2021-36806 | Nov 30, 2023 |
Sophos Email Appliance <4.5.3.4 XSS + Open Redirect ReflectedA reflected XSS vulnerability allows an open redirect when the victim clicks a malicious link to an error page on Sophos Email Appliance older than version 4.5.3.4. |
|
| CVE-2023-5552 | Oct 18, 2023 |
Password Disclosure via SPX in Sophos Firewall <19.5.3A password disclosure vulnerability in the Secure PDF eXchange (SPX) feature allows attackers with full email access to decrypt PDFs in Sophos Firewall version 19.5 MR3 (19.5.3) and older, if the password type is set to Specified by sender. |
|
| CVE-2023-33335 | Jul 05, 2023 |
XSS in Sophos iView (grpname) allows arbitrary script executionCross Site Scripting (XSS) in Sophos Sophos iView (The EOL was December 31st 2020) in grpname parameter that allows arbitrary script to be executed. |
|
| CVE-2023-33336 | Jun 30, 2023 |
Sophos Web Appliance v4.3.9.1 XSS via double quotesReflected cross site scripting (XSS) vulnerability was discovered in Sophos Web Appliance v4.3.9.1 that allows for arbitrary code to be inputted via the double quotes. |
|
| CVE-2022-4934 | Apr 04, 2023 |
Privileged CMD Injection in Sophos Web Appliance <4.3.10.4 ExceptionWizardA post-auth command injection vulnerability in the exception wizard of Sophos Web Appliance older than version 4.3.10.4 allows administrators to execute arbitrary code. |
|
| CVE-2020-36692 | Apr 04, 2023 |
Sophos Web Appliance <4.3.10.4 Reflected XSS in Report SchedulerA reflected XSS via POST vulnerability in report scheduler of Sophos Web Appliance versions older than 4.3.10.4 allows execution of JavaScript code in the victim browser via a malicious form that must be manually submitted by the victim while logged in to SWA. |
|
| CVE-2023-1671 | Apr 04, 2023 |
Pre-auth Cmd Injection in Sophos Web Appliance <4.3.10.4 warn-proceedA pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code. |
|
| CVE-2022-48310 | Mar 01, 2023 |
Info Disclosure in Sophos Connect <2.2.90: Key Material in Support ArchivesAn information disclosure vulnerability allows sensitive key material to be included in technical support archives in Sophos Connect versions older than 2.2.90. |
|
| CVE-2022-48309 | Mar 01, 2023 |
CSRF in Sophos Connect prior 2.2.90 enables log & support archive downloadA CSRF vulnerability allows malicious websites to retrieve logs and technical support archives in Sophos Connect versions older than 2.2.90. |
|
| CVE-2022-4901 | Mar 01, 2023 |
XSS in Sophos Connect 2.2.90+ to run JS via VPN configMultiple stored XSS vulnerabilities in Sophos Connect versions older than 2.2.90 allow Javascript code to run in the local UI via a malicious VPN configuration that must be manually loaded by the victim. |
|
| CVE-2022-3710 | Dec 01, 2022 |
Sophos Firewall <19.5 GA: Post-Auth Read-Only SQLi in API ControllerA post-auth read-only SQL injection vulnerability allows API clients to read non-sensitive configuration database contents in the API controller of Sophos Firewall releases older than version 19.5 GA. |
|
| CVE-2022-3226 | Dec 01, 2022 |
Sophos Firewall <19.5 OS Command Injection via SSL VPN Config UploadAn OS command injection vulnerability allows admins to execute code via SSL VPN configuration uploads in Sophos Firewall releases older than version 19.5 GA. |
|
| CVE-2022-3696 | Dec 01, 2022 |
CVE-2022-3696: Webadmin Code Injection in Sophos Firewall <19.5A post-auth code injection vulnerability allows admins to execute code in Webadmin of Sophos Firewall releases older than version 19.5 GA. |
|
| CVE-2022-3709 | Dec 01, 2022 |
Stored XSS in Sophos Firewall Webadmin (pre19.5 GA) Admin SuperAdminA stored XSS vulnerability allows admin to super-admin privilege escalation in the Webadmin import group wizard of Sophos Firewall releases older than version 19.5 GA. |
|
| CVE-2022-3713 | Dec 01, 2022 |
Sophos Firewall <19.5 GA: Wifi Controller Code Injection CVE-2022-3713A code injection vulnerability allows adjacent attackers to execute code in the Wifi controller of Sophos Firewall releases older than version 19.5 GA. |
|
| CVE-2022-3711 | Dec 01, 2022 |
Post-auth Read-Only SQLi in Sophos Firewall <=19.5 GA's User PortalA post-auth read-only SQL injection vulnerability allows users to read non-sensitive configuration database contents in the User Portal of Sophos Firewall releases older than version 19.5 GA. |
|
| CVE-2022-3980 | Nov 16, 2022 |
XEE SSRF/Code Exec in Sophos Mobile Managed (v5.0.09.7.4)An XML External Entity (XEE) vulnerability allows server-side request forgery (SSRF) and potential code execution in Sophos Mobile managed on-premises between versions 5.0.0 and 9.7.4. |
|
| CVE-2022-3236 | Sep 23, 2022 |
Code Injection in Sophos Firewall v19.0 MR1 and older User Portal/WebadminA code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older. |
|
| CVE-2022-1807 | Sep 07, 2022 |
SQLi in Sophos FW Webadmin (<=18.5 MR4/<=19.0 MR1) Priv EscalMultiple SQLi vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 18.5 MR4 and version 19.0 MR1. |
|
| CVE-2021-25266 | Apr 27, 2022 |
An insecure data storage vulnerabilityAn insecure data storage vulnerability allows a physical attacker with root privileges to retrieve TOTP secret keys from unlocked phones in Sophos Authenticator for Android version 3.4 and older, and Intercept X for Mobile (Android) before version 9.7.3495. |
|
| CVE-2022-0331 | Mar 29, 2022 |
An information disclosure vulnerability in WebadminAn information disclosure vulnerability in Webadmin allows an unauthenticated remote attacker to read the device serial number in Sophos Firewall version v18.5 MR2 and older. |
|
| CVE-2022-1040 | Mar 25, 2022 |
An authentication bypass vulnerability in the User Portal and WebadminAn authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older. |
|
| CVE-2022-0386 | Mar 22, 2022 |
A post-auth SQL injection vulnerability in the Mail Manager potentiallyA post-auth SQL injection vulnerability in the Mail Manager potentially allows an authenticated attacker to execute code in Sophos UTM before version 9.710. |
|
| CVE-2022-0652 | Mar 22, 2022 |
Confd log files contain local users', including rootâs, SHA512crypt password hashes with insecure access permissionsConfd log files contain local users', including rootâs, SHA512crypt password hashes with insecure access permissions. This allows a local attacker to attempt off-line brute-force attacks against these password hashes in Sophos UTM before version 9.710. |
|
| CVE-2021-36809 | Mar 08, 2022 |
A local attacker can overwrite arbitrary files on the system with VPN client logs using administrator privilegesA local attacker can overwrite arbitrary files on the system with VPN client logs using administrator privileges, potentially resulting in a denial of service and data loss, in all versions of Sophos SSL VPN client. |
|
| CVE-2021-36807 | Nov 26, 2021 |
An authenticated user could potentially execute codeAn authenticated user could potentially execute code via an SQLi vulnerability in the user portal of SG UTM before version 9.708 MR8. |
|
| CVE-2021-25269 | Nov 26, 2021 |
A local administrator could prevent the HMPA serviceA local administrator could prevent the HMPA service from starting despite tamper protection using an unquoted service path vulnerability in the HMPA component of Sophos Intercept X Advanced and Sophos Intercept X Advanced for Server before version 2.0.23, as well as Sophos Exploit Prevention before version 3.8.3. |
And others... |
| CVE-2021-36808 | Oct 30, 2021 |
A local attacker could bypass the app password using a race condition in Sophos Secure Workspace for Android before version 9.7.3115.A local attacker could bypass the app password using a race condition in Sophos Secure Workspace for Android before version 9.7.3115. |
|
| CVE-2021-25270 | Oct 08, 2021 |
A local attacker could execute arbitrary code with administrator privileges in HitmanPro.Alert before version Build 901.A local attacker could execute arbitrary code with administrator privileges in HitmanPro.Alert before version Build 901. |
|
| CVE-2021-25271 | Oct 08, 2021 |
A local attacker could read or write arbitrary files with administrator privileges in HitmanPro before version Build 318.A local attacker could read or write arbitrary files with administrator privileges in HitmanPro before version Build 318. |
|
| CVE-2021-25273 | Jul 29, 2021 |
Stored XSS can execute as administrator in quarantined email detail view in Sophos UTM before version 9.706.Stored XSS can execute as administrator in quarantined email detail view in Sophos UTM before version 9.706. |
|
| CVE-2021-25264 | May 17, 2021 |
In multiple versions of Sophos Endpoint products for MacOSIn multiple versions of Sophos Endpoint products for MacOS, a local attacker could execute arbitrary code with administrator privileges. |
|
| CVE-2020-29574 | Dec 11, 2020 |
An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely. |
|
| CVE-2020-25223 | Sep 25, 2020 |
A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11 |
|
| CVE-2020-15069 | Jun 29, 2020 |
Sophos XG Firewall 17.x through v17.5 MR12Sophos XG Firewall 17.x through v17.5 MR12 allows a Buffer Overflow and remote code execution via the HTTP/S Bookmarks feature for clientless access. Hotfix HF062020.1 was published for all firewalls running v17.x. |
|
| CVE-2020-14980 | Jun 22, 2020 |
The Sophos Secure Email application through 3.9.4 for Android has Missing SSL Certificate Validation.The Sophos Secure Email application through 3.9.4 for Android has Missing SSL Certificate Validation. |
|
| CVE-2020-12271 | Apr 27, 2020 |
A SQL injection issue was found in SFOS 17.0A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords) |
|
| CVE-2020-10947 | Apr 17, 2020 |
Mac Endpoint for Sophos Central before 9.9.6 and Mac Endpoint for Sophos Home before 2.2.6Mac Endpoint for Sophos Central before 9.9.6 and Mac Endpoint for Sophos Home before 2.2.6 allow Privilege Escalation. |
|
| CVE-2020-9540 | Mar 02, 2020 |
Sophos HitmanPro.Alert before build 861Sophos HitmanPro.Alert before build 861 allows local elevation of privilege. |
|
| CVE-2020-9363 | Feb 24, 2020 |
The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archiveThe Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. NOTE: the vendor feels that this does not apply to endpoint-protection products because the virus would be detected upon extraction. |
And others... |
| CVE-2018-3971 | Oct 25, 2018 |
An exploitable arbitrary write vulnerability exists in the 0x2222CC IOCTL handler functionality of Sophos HitmanPro.Alert 3.7.6.744An exploitable arbitrary write vulnerability exists in the 0x2222CC IOCTL handler functionality of Sophos HitmanPro.Alert 3.7.6.744. A specially crafted IRP request can cause the driver to write data under controlled by an attacker address, resulting in memory corruption. An attacker can send IRP request to trigger this vulnerability. |
|
| CVE-2018-3970 | Oct 25, 2018 |
An exploitable memory disclosure vulnerability exists in the 0x222000 IOCTL handler functionality of Sophos HitmanPro.Alert 3.7.6.744An exploitable memory disclosure vulnerability exists in the 0x222000 IOCTL handler functionality of Sophos HitmanPro.Alert 3.7.6.744. A specially crafted IRP request can cause the driver to return uninitialized memory, resulting in kernel memory disclosure. An attacker can send an IRP request to trigger this vulnerability. |
|
| CVE-2018-6851 | Jul 09, 2018 |
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege EscalationSophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x80206040. By crafting an input buffer we can control the execution path to the point where the constant DWORD 0 will be written to a user-controlled address. We can take advantage of this condition to zero-out the pointer to the security descriptor in the object header of a privileged process or modify the security descriptor itself and run code in the context of a process running as SYSTEM. |
And others... |
| CVE-2018-6852 | Jul 09, 2018 |
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege EscalationSophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x80202298. By crafting an input buffer we can control the execution path to the point where the nt!memset function is called to zero out contents of a user-controlled address. We can take advantage of this condition to zero-out the pointer to the security descriptor in the object header of a privileged process or modify the security descriptor itself and run code in the context of a process running as SYSTEM. |
And others... |
| CVE-2018-6853 | Jul 09, 2018 |
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege EscalationSophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x80206024. By crafting an input buffer we can control the execution path to the point where a global variable will be written to a user controlled address. We can take advantage of this condition to zero-out the pointer to the security descriptor in the object header of a privileged process or modify the security descriptor itself and run code in the context of a process running as SYSTEM. |
And others... |
| CVE-2018-6854 | Jul 09, 2018 |
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege EscalationSophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via multiple IOCTLs, e.g., 0x8810200B, 0x8810200F, 0x8810201B, 0x8810201F, 0x8810202B, 0x8810202F, 0x8810203F, 0x8810204B, 0x88102003, 0x88102007, 0x88102013, 0x88102017, 0x88102027, 0x88102033, 0x88102037, 0x88102043, and 0x88102047. When some conditions in the user-controlled input buffer are not met, the driver writes an error code (0x2000001A) to a user-controlled address. Also, note that all the aforementioned IOCTLs use transfer type METHOD_NEITHER, which means that the I/O manager does not validate any of the supplied pointers and buffer sizes. So, even though the driver checks for input/output buffer sizes, it doesn't validate if the pointers to those buffers are actually valid. So, we can supply a pointer for the output buffer to a kernel address space address, and the error code will be written there. We can take advantage of this condition to modify the SEP_TOKEN_PRIVILEGES structure of the Token object belonging to the exploit process and grant SE_DEBUG_NAME privilege. This allows the exploit process to interact with higher privileged processes running as SYSTEM and execute code in their security context. |
And others... |