{"id":4945,"date":"2018-02-09T08:45:09","date_gmt":"2018-02-09T07:45:09","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=4945"},"modified":"2018-02-09T08:45:56","modified_gmt":"2018-02-09T07:45:56","slug":"vpn-bug-in-cisco-asa-software-used-in-the-wild","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/02\/09\/vpn-bug-in-cisco-asa-software-used-in-the-wild\/","title":{"rendered":"VPN vulnerability in Cisco ASA software used in the wild"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/02\/08\/vpn-bug-in-cisco-asa-software-wird-ausgenutzt-updaten\/\" target=\"_blank\">German<\/a>]Cisco's ASA software has a critical bug in the VPN feature that is already exploited by hackers. There is a firmware update from Cisco which should be installed as soon as possible.<\/p>\n<p><!--more--><\/p>\n<p>On January 29th 2018 Cisco released a <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180129-asa1\" target=\"_blank\">Security Advisory<\/a> for its Adaptive Security Appliance (ASA), see my article <a href=\"https:\/\/borncity.com\/win\/2018\/01\/31\/psa-vulnerabilities-in-cisco-products-updates-required\/\" target=\"_blank\">PSA: Vulnerabilities in Cisco products \u2013 updates required<\/a>. On February 5, 2018 Cisco updated the advisory:<\/p>\n<blockquote>\n<p><strong>UPDATED 2\/5\/2018<\/strong>: After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it was also found that the original fix was incomplete so new fixed code versions are now available. Please see the <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180129-asa1#fixed\" target=\"_blank\">Fixed Software<\/a> section for more information.. <\/p>\n<\/blockquote>\n<p>Cisco has released revised software updates that are urgently needed. The following Cisco products are affected.<\/p>\n<p><img decoding=\"async\" title=\"Cisco ASA\" alt=\"Cisco ASA\" src=\"https:\/\/i.imgur.com\/TsteSEW.jpg\"><br \/>(Cisco ASA, Source: Cisco)<\/p>\n<ul>\n<li>3000 Series Industrial Security Appliance (ISA)\n<li>ASA 5500 Series Adaptive Security Appliances\n<li>ASA 5500-X Series Next-Generation Firewalls\n<li>ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers\n<li>ASA 1000V Cloud Firewall\n<li>Adaptive Security Virtual Appliance (ASAv)\n<li>Firepower 2100 Series Security Appliance\n<li>Firepower 4110 Security Appliance\n<li>Firepower 4120 Security Appliance\n<li>Firepower 4140 Security Appliance\n<li>Firepower 4150 Security Appliance\n<li>Firepower 9300 ASA Security Module\n<li>Firepower Threat Defense Software (FTD)\n<li>FTD Virtual<\/li>\n<\/ul>\n<p>The table below lists the features and vulnerable configuration, details may be found within <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180129-asa1\" target=\"_blank\">this&nbsp; Cisco document<\/a>.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/i.imgur.com\/U8IYgSj.jpg\"><br \/>(Source: Cisco)<\/p>\n<p>Bleeping Computer reports <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-pounce-on-cisco-asa-flaw-cve-2018-0101\/\" target=\"_blank\">here<\/a>, that hackers are abusing CVE-2018-0101 in Cisco ASA to overtake the devices. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Cisco's ASA software has a critical bug in the VPN feature that is already exploited by hackers. There is a firmware update from Cisco which should be installed as soon as possible.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22],"tags":[69],"class_list":["post-4945","post","type-post","status-publish","format-standard","hentry","category-security","category-update","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=4945"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4945\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=4945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=4945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=4945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}