Q
Manage Learn to apply best practices and optimize your operations.

How was a Cisco firewall vulnerability exploited by threat actors?

Threat actors exploited a critical Cisco firewall vulnerability that received a CVSS score of 10. Discover how this flaw works and how it was exploited with Judith Myerson.

Cisco confirmed that a critical, zero-day vulnerability in its firewall software was actively exploited by threat...

actors. What is the Cisco firewall vulnerability, and how were attackers exploiting it?

The Cisco firewall vulnerability points to an issue in the XML parser of Cisco Adaptive Security Appliance (ASA) that was found after the first software fix. The attack took place when threat actors sent a malicious XML packet to a vulnerable interface of the impacted Cisco products. Because authentication credentials were not required to gain remote code execution, full control of the firewalls or the system, the attack was successful. Furthermore, the vulnerability, which was rated a 10 in the Common Vulnerability Scoring System (CVSS), caused Cisco to reload the firewall software, causing low memory conditions and prevented processing of incoming VPN authentication requests.

Initially discovered by a research at cybersecurity company NCC Group, the Cisco firewall vulnerability was first made public in a Jan. 29 advisory from the networking giant. However, a short time later Cisco warned that the flaw was under attack. To exploit the vulnerability, the VPN must be turned on and the ASA must have SSL and DTSL services or Internet Key Exchange (IKEv2) remote access VPN services must be enabled on an interface. IKEv2 protocol is suited for VPN implementations requiring network changes, such as going from wireless to wired, and providing support for mobile users.

Cisco products that were impacted include: ASA 5000-X Series Next-Generation Firewalls, ASA 1000V Cloud Firewall, Firepower 2100 Series Security Appliance, Firepower 4110 Security Appliance, FireFirepower 4150 Security Appliance, Firepower 9300 ASA Security Module and Firepower Threat Defense Software.

The Feb. 18 update of Cisco security advisory provides a list of the vulnerable Cisco ASA features and the vulnerable configuration from the command-line interface (CLI). Hackers can determine if a device is vulnerable if either an SSL or a DTLS listen sockets for any TCP port is present or if the ASA device is configured for one or more of the ASA features.

The following shows how legitimate users and hackers can use a CLI command to find the sockets:

ciscoasa# show asp table socket | include SSL|DTLS

SSL   00185038  LISTEN  172.16.0.250:443     0.0.0.0:*

SSL   00188638  LISTEN  10.0.0.250:443       0.0.0.0:*

DTLS  0018f7a8  LISTEN  10.0.0.250:443       0.0.0.0:*

 Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)

This was last published in May 2018

Dig Deeper on Penetration testing, ethical hacking and vulnerability assessments

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Does your enterprise use an impacted ASA device? If so, how was the issue mitigated?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close