Sophos Endpoint Protection 安全漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1124952 漏洞类型 加密问题
发布时间 2018-04-06 更新时间 2019-10-23
CVE编号 CVE-2018-9233 CNNVD-ID CNNVD-201804-265
漏洞平台 Windows CVSS评分 2.1
Sophos Endpoint Protection是英国Sophos公司的一套同时提供防恶意软件和数据保护功能的安全防护解决方案。该方案包括恶意软件防护、客户端防火墙和数据泄露保护等功能。 Sophos Endpoint Protection 10.7版本中存在加密问题漏洞,该漏洞源于在%PROGRAMDATA%SophosSophos Anti-VirusConfigmachine.xml中程序使用了未加盐的SHA-1散列来存储密码。本地攻击者可借助彩虹表或其他方法利用该漏洞确定明文密码,更改设置。
[+] Credits: John Page (aka hyp3rlinx)		
[+] Website:
[+] Source:
[+] ISR: Apparition Security            


Sophos Endpoint Protection - Control Panel v10.7

Sophos Endpoint Protection helps secure your workstation by adding prevention, detection, and response technology on top of your operating system.
Sophos Endpoint Protection is designed for workstations running Windows and macOS. It adds exploit technique mitigations, CryptoGuard anti-ransomware,
anti-malware, web security, malicious traffic detection, and deep system cleanup.

Vulnerability Type:
Insecure Crypto

CVE Reference:

Security Issue:
Sophos endpoint protection control panel authentication uses weak unsalted unicoded cryptographic hash (SHA1) function, not using salt allows attackers that gain access to hash 
ability to conduct faster cracking attacks using pre-computed dictionaries, e.g. rainbow tables. This can potentially result in unauthorized access that could allow for
changing of settings, whitelist or unquarantine files.

Password and config for Sophos endpoint protection control panel is stored here:
C:\ProgramData\Sophos\Sophos Anti-Virus\Config\machine.xml


SHA1 (Unicode) encoding non salted pass = abc123


Using PHP's sha1 function with "mb_convert_encoding" as UTF-16LE we can verify.

C:\>php -r "print sha1(mb_convert_encoding('abc123', 'UTF-16LE', 'UTF-8'));"

Network Access:


Disclosure Timeline:
Vendor Notification: December 4, 2017
Vendor Acknowledgement: December 12, 2017
Vendor request additional time before disclosing.
additional time has passed.
April 4, 2018  : Public Disclosure

[+] Disclaimer
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
or exploits by the author or elsewhere. All content (c).