Support-Portal

UTM Up2Date 9.716 (empfohlene Version) grade

Dieses Update behebt mehrere sicherheitskritische Probleme:

CVE-2002-20001

Schwachstelle im Diffie-Hellman-Schlüsselaustausch ermöglicht Denial-of-Service-Angriff

CVE-2022-40735

Schwachstelle in Diffie-Hellman-Schlüsselaustausch ermöglicht Denial-of-Service-Angriff

CVE-2023-0215

Schwachstelle in OpenSSL ermöglicht Denial-of-Service-Angriff

CVE-2023-0286

Schwachstelle in OpenSSL und LibreSSL ermöglicht u. a. Ausspähen von Informationen

CVE-2023-3367

Schwachstelle in Sophos UTM Software ermöglicht Ausführen beliebigen Programmcodes

 

Beschreibung

Bemerkungen

CFFS für Webkategorisierung wird von Sophos UTM ab diesem Update nicht mehr unterstützt.

Betroffene Produktgruppen

Bugfixes

  • NUTM-14139: [Basesystem] Mexico time zone still switches to DST
  • NUTM-14089: [Basesystem] High CPU usage by rrdtool due to DST
  • NUTM-14051: [Basesystem] Upgrade Postgres to 9.2.24 to address numerous vulnerabilities
  • NUTM-14038: [Basesystem] Address OpenSSL vulnerabilities: CVE-2023-0286, CVE-2023-0215
  • NUTM-13689: [Basesystem] Upgrade Apache to 2.4.56 to address numerous vulnerabilities
  • NUTM-13537: [Basesystem] VLAN interfaces on a RED interface are deactivated if you turn off and then turn on the RED interface
  • NUTM-14172: [Email] Potential denial of service vulnerability in SPX portal and Webadmin: CVE-2002-20001, CVE-2022-40735
  • NUTM-14107: [Email] SPX announcement email without message ID header
  • NUTM-14039: [Email] Potential denial of service vulnerability in email service: CVE-2002-20001, CVE-2022-40735
  • NUTM-13882 : [Email] Downloading emails from Mail Manager fails
  • NUTM-14217: [UI framework] WebAdmin post-auth command injection: CVE-2023-3367
  • NUTM-14134: [WAF] Potential denial of service vulnerability in webserver protection: CVE-2002-20001, CVE-2022-40735