Newly Found Cisco Vulnerability Dubbed "Critical" Flaw

cyber-security-1923446_1920

Last week, Cisco released a high-importance alert for their customers who use its Adaptive Security Appliance (ASA) software urging them to patch a critical-level bug that could be easily exploited. This vulnerability affects the VPN feature of the software, and exploiting it could allow a hacker to force a reload of the system, or even remotely take control.

“An attacker could exploit this vulnerability by sending a crafted XML packet to a vulnerable interface on an affected system,” Cisco explains in their warning. “An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, cause a reload of the affected device or stop processing of incoming VPN authentication requests.”

If left unpatched, any devices configured with Cisco’s WebVPN software, including security applications and firewalls, could be easily bypassed by a malicious party. Due to the severity of the vulnerability Cisco has given the issue a Common Vulnerability Scoring System a Critical rating of 10 out of 10.

The following are the vulnerable products identified by Cisco:

  • 3000 Series Industrial Security Appliance (ISA)
  • ASA 5500 Series Adaptive Security Appliances
  • ASA 5500-X Series Next-Generation Firewalls
  • ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
  • ASA 1000V Cloud Firewall
  • Adaptive Security Virtual Appliance (ASAv)
  • Firepower 2100 Series Security Appliance
  • Firepower 4110 Security Appliance
  • Firepower 4120 Security Appliance
  • Firepower 4140 Security Appliance
  • Firepower 4150 Security Appliance
  • Firepower 9300 ASA Security Module
  • Firepower Threat Defense Software (FTD)
  • FTD Virtual

Cisco notes that only those ASA devices that have the WebVPN feature enabled are vulnerable, but encourage all their users to patch their systems as soon as possible. As of now, Cisco says they are not aware of any attacks that have taken advantage of this vulnerability.

Cedric Halbronn from the NCC group explained how he was able to exploit the flaw at last weekend’s Recon Brussels conference. He detailed their use of a fuzzer, a software testing technique that injects random, invalid data into a program to see how it withstands it. The fuzzer allowed Halbronn and his team to discover and exploit the bug.

An initial patch was released at the same time as Cisco’s initial announcement of the vulnerability. A second, more complete version was released on February 5th.

“After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it was also found that the original fix was incomplete so new fixed code versions are now available.”

To make sure all of your Cisco software are up-to-date, contact the Cisco Technical Assistance Center or call Info Advantage at (585) 254-8710 to talk to a specialist.

Simple Security Tips for the Non-Technical
Why Forcing Password Changes Isn't Always the Best...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 18 2018

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events Hackers technology solutions malware backup Software Business Management Ransomware cyber attacks Productivity Business practice Business Continuity Innovation Mobility Hardware Disaster Recovery Microsoft cloud Network Security Computer Avoiding Downtime Internet business hardware solutions Office tips Business Computing Efficiency Quick Tips Windows 10 Mobile Devices Health cyber criminals Law Enforcement data breach email Passwords Social Operating System Laptop Education Flexibility Wi-Fi Office 365 Identity Theft Application Smartphone IT data voip Facebook History IT Services internet user Communication Small Business Antivirus Humor Miscellaneous Upgrade Personal Information Risk Management Money cloud capabilities Mobile Computing servers Saving Money Information Technology IT Support Automation cars Wireless virtualized servers Scalability Internet Protocol Text Messaging Encryption Video Games Employer-Employee Relationship Recovery Workplace Tips Google Battery Data recovery Update Reputation holiday Remote Computing spam business continuity plan ATMs HaaS Point of Sale Net worth How To Artificial Intelligence Marketing Password Server hardware refreshes emails Virtualization Gadgets Managed IT Services Microsoft Office Windows Search downtime Alert content Automobile ecommerce intel Managing Stress Legal Software-based phone systems time threats Cybercrime BDR iPhone Router phone systems Apps Virtual Reality Government byod Worker Commute Touchpad Instant Messaging Telephone Systems Robot VoIP right Internet Exlporer PDF Black Market Work/Life Balance User Tips Telephony Advertising Google Drive Hosted Solution Relocation Entertainment Hosted Solutions USB Users Private Cloud VPN Smartphones Social Media computer network End of Support

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name