轉發 台灣電腦網路危機處理暨協調中心 TWCERTCC-200-202509-00000005
[內容說明]
Sophos針對旗下AP6系列無線存取點發布重大資安公告(CVE-2025-10159,CVSS:9.8),此為身分驗證繞過漏洞,允許攻擊者存取無線存取點的管理IP位址,從而取得管理員權限。
備註:採用預設自動更新政策的用戶無需額外動作;若已停用自動更新,請手動升級以修正本次安全漏洞。
[影響平台]
AP6系列無線存取點韌體版本1.7.2563(不含)之前版本
[建議措施]
將AP6系列無線存取點韌體版本更新至1.7.2563(含)之後版本
[參考資料]
1. Resolved Authentication Bypass Vulnerability in Sophos AP6 Series Wireless Access Points Firmware (CVE-2025-10159) https://www.sophos.com/en-us/security-advisories/sophos-sa-20250909-ap6
2. CVE-2025-10159 https://www.cve.org/CVERecord?id=CVE-2025-10159
Forwarded by Taiwan Computer Network Crisis and Coordination Center (TWCERTCC-200-202509-00000005)
[Description]
Sophos has issued a critical security advisory (CVE-2025-10159, CVSS: 9.8) for its AP6 series wireless access points. This vulnerability, known as an authentication bypass, allows an attacker to gain access to the wireless access point's management IP address and thereby gain administrator privileges.
Note: Users using the default automatic update policy do not need to take any additional action. If automatic updates are disabled, please manually update to address this vulnerability.
[Affected Platforms]
AP6 Series Wireless Access Point Firmware Version 1.7.2563 or Later
[Recommended Action]
Update the AP6 Series Wireless Access Point Firmware to Version 1.7.2563 or Later
[References]
1. Resolved Authentication Bypass Vulnerability in Sophos AP6 Series Wireless Access Points Firmware (CVE-2025-10159) https://www.sophos.com/en-us/security-advisories/sophos-sa-20250909-ap6
2. CVE-2025-10159 https://www.cve.org/CVERecord?id=CVE-2025-10159