Lucian Constantin
CSO Senior Writer

Update: Cisco recommends McAfee switch for IronPort customers hit by Sophos flaws

news
Nov 9, 20123 mins

Attackers could gain control of IronPort appliances because of flaws in Sophos Anti-Virus, Cisco said

Cisco Systems has warned customers about critical vulnerabilities in the Sophos antivirus engine included in its Cisco IronPort email and Web security appliances.

“Cisco IronPort Email Security Appliances (ESA) and Cisco IronPort Web Security Appliances (WSA) include versions of Sophos Anti-Virus that contain multiple vulnerabilities that could allow an unauthenticated, remote attacker to gain control of the system, escalate privileges, or cause a denial-of-service (DoS) condition,” Cisco said Friday in a security advisory.

[ Find out how to block the viruses, worms, and other malware that threaten your business, with hands-on advice from expert contributors in InfoWorld’s “Malware Deep Dive” PDF guide. | Keep up with key security issues with InfoWorld’s Security Adviser blog and Security Central newsletter. ]

Cisco rated the severity of the vulnerabilities at 9.7 out of 10 on the CVSS (Common Vulnerability Scoring System) scale. This means that the flaws can be attacked from the network, have a low complexity access level and can completely compromise the confidentiality and integrity of the affected products.

The vulnerabilities in Sophos Anti-Virus that affect Cisco IronPort appliances were publicly disclosed by Google security engineer Tavis Ormandy on Monday, Cisco said.

According to a Sophos knowledgebase article, fixes for some of the vulnerabilities reported by Ormandy were released in October. However, patches for three particular flaws, including a critical one for which proof-of-concept exploit code is publicly available, were only rolled out on Monday.

“As updates that address these vulnerabilities become available from Sophos, Cisco is working to qualify and automatically provision them through the Cisco IronPort ESA and WSA platforms,” Cisco said. “Fixes for the vulnerabilities that are described in this advisory are currently not available; however, there are configuration workarounds available that may eliminate the risk for most customers.”

The workaround that Cisco refers to requires users to stop using Sophos Anti-virus and switch to a different antivirus engine supported by the IronPort appliances.

“To mitigate this issue, customers can configure the Cisco IronPort appliances to use an alternate antivirus program,” the company said. “Cisco is providing 30-day trial licenses for McAfee AntiVirus through IronPort Technical Support as an interim workaround.”

“Sophos has been in contact with Cisco since 15th October regarding the potential vulnerabilities in the engine and released an updated version of the engine to address the majority of vulnerabilities to Cisco on 23rd October,” Graham Cluley, senior technology consultant at Sophos, said Friday via email. “A new version of the engine released this week ensures that all the vulnerabilities identified by Tavis Ormandy have been patched.”

“Sophos recommends that customers follow Cisco’s advisory and update to the latest version of the engine as soon as it is released by Cisco,” Cluley said.

Cisco did not immediately return a request for comment seeking clarifications on whether the Sophos antivirus engine in the IronPort appliances will be updated automatically or if customers need to update it manually.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author