We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Cisco recommends McAfee switch for IronPort customers hit by Sophos flaws

Cisco recommends McAfee switch for IronPort customers hit by Sophos flaws

Attackers could gain control of IronPort appliances because of flaws in Sophos Anti-Virus, Cisco said

Article comments

Cisco Systems has warned customers about critical vulnerabilities in the Sophos antivirus engine included in its Cisco IronPort email and Web security appliances.

"Cisco IronPort Email Security Appliances (ESA) and Cisco IronPort Web Security Appliances (WSA) include versions of Sophos Anti-Virus that contain multiple vulnerabilities that could allow an unauthenticated, remote attacker to gain control of the system, escalate privileges, or cause a denial-of-service (DoS) condition," Cisco said today.

Cisco rated the severity of the vulnerabilities at 9.7 out of 10 on the CVSS (Common Vulnerability Scoring System) scale. This means that the flaws can be attacked from the network, have a low complexity access level and can completely compromise the confidentiality and integrity of the affected products.

The vulnerabilities in Sophos Anti-Virus that affect Cisco IronPort appliances were publicly disclosed by Google security engineer Tavis Ormandy on Monday, Cisco said.

According to a Sophos knowledgebase article, fixes for some of the vulnerabilities reported by Ormandy were released in October. However, patches for three particular flaws, including a critical one for which proof-of-concept exploit code is publicly available, were only rolled out at the start of the week.

"As updates that address these vulnerabilities become available from Sophos, Cisco is working to qualify and automatically provision them through the Cisco IronPort ESA and WSA platforms," Cisco said. "Fixes for the vulnerabilities that are described in this advisory are currently not available; however, there are configuration workarounds available that may eliminate the risk for most customers."

The workaround that Cisco refers to requires users to stop using Sophos Anti-virus and switch to a different antivirus engine supported by the IronPort appliances.

"To mitigate this issue, customers can configure the Cisco IronPort appliances to use an alternate antivirus program," the company said. "Cisco is providing 30-day trial licences for McAfee AntiVirus through IronPort Technical Support as an interim workaround."

Sophos did not immediately return a request for comment regarding the availability of patches for the vulnerabilities described in Cisco's security advisory.

Cisco did not immediately return a request for comment seeking clarifications on whether the Sophos antivirus engine in the IronPort appliances will be updated automatically or if customers need to update it manually.

Share:

Comments

Advertisement
Advertisement
Send to a friend

Email this article to a friend or colleague:


PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.


ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open
* *