Cisco Warns of Exploitation of Legacy ASA WebVPN Vulnerability

From the “this isn’t good” department comes news from Cisco who have issued a warning about a vulnerability in the WebVPN login page of their Cisco Adaptive Security Appliance (ASA) Software. This flaw could enable an unauthenticated remote attacker to launch a cross-site scripting (XSS) attack against a WebVPN user on the Cisco ASA.

The issue stems from inadequate input validation for a specific parameter. An attacker could exploit this weakness by persuading a user to click on a malicious link.

Here’s why this isn’t good. Cisco states “There are no workarounds that address this vulnerability.”

It’s actually worse than that, Cisco also states that it has become aware of “additional attempted exploitation” of the vulnerability in the wild.

Lawrence Pingree, Vice President, Dispersive

  “It’s prudent that organizations continuously uplift their Network and VPN infrastructure. Outdated and especially unsupported systems can become a very big problem from a security perspective, adding insult to injury since the technology’s intent is to add security.”

There’s a lot of ASA boxes out there. Which means that this is a today problem for many organizations. Given what could happen,  Cisco ASA are highly recommended to keep their installations up-to-date to avoid being pwned.

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading