CVE-2025-7382
Published: 21 July 2025
Summary
CVE-2025-7382 is a high-severity OS Command Injection (CWE-78) vulnerability in Sophos Firewall Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 34.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the command injection vulnerability by requiring timely flaw remediation through vendor patches like upgrading to Sophos Firewall v21.0 MR2.
Prevents command injection exploitation in WebAdmin by enforcing validation of untrusted inputs to reject malicious commands.
Mitigates adjacent network (AV:A) access to vulnerable HA auxiliary devices by enforcing boundary protections like network segmentation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in WebAdmin enables pre-auth RCE on network device (T1190) via Unix shell commands (T1059.004).
NVD Description
A command injection vulnerability in WebAdmin of Sophos Firewall versions older than 21.0 MR2 (21.0.2) can lead to adjacent attackers achieving pre-auth code execution on High Availability (HA) auxiliary devices, if OTP authentication for the admin user is enabled.
Deeper analysisAI
CVE-2025-7382 is a command injection vulnerability (CWE-78) in the WebAdmin component of Sophos Firewall versions older than 21.0 MR2 (v21.0.2). Published on 2025-07-21, it affects High Availability (HA) auxiliary devices when OTP authentication is enabled for the admin user. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
Adjacent attackers on the same network segment can exploit the vulnerability with low complexity and no prior privileges or user interaction required. Successful exploitation enables pre-authentication code execution on HA auxiliary devices, granting attackers high-level confidentiality, integrity, and availability compromises.
The Sophos security advisory (https://www.sophos.com/en-us/security-advisories/sophos-sa-20250721-sfos-rce) addresses mitigation by recommending an upgrade to Sophos Firewall v21.0 MR2 (v21.0.2) or later, where the vulnerability has been remediated.
Details
- CWE(s)