Cisco ASA Firewalls and Cisco FTDs can be exploited remotely due to “Remote Code Execution and Denial of Service Vulnerability”

According to latest Cisco Security Advisories and Alerts update, Cisco ASA Firewalls, and Cisco FTDs can be exploited remotely provided WebVPN is configured on them. There is a vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.

The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1

Continue reading.......


Nasir Abbas

Inspiring Teams to Drive DevSecOps | Cyber Security | Automation Innovation | Access Management | Secure Hybrid Cloud Solutions

7 年

Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html

要查看或添加评论,请登录

Yasir Irfan的更多文章

社区洞察

其他会员也浏览了