• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cisco Network Security Flaw Leaks Sensitive Details

Cisco Network Security Flaw Leaks Sensitive Details

You are here: Home / Latest Cyber Security Vulnerabilities / Cisco Network Security Flaw Leaks Sensitive Details
July 23, 2020

The flaw exists in Cisco’s network security Firepower Menace Defense (FTD) application and its Adaptive Security Appliance (ASA) software.

A superior-severity vulnerability in Cisco’s network security application could lay bare delicate info – such as WebVPN configurations and web cookies –  to distant, unauthenticated attackers.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The flaw exists in the web services interface of Cisco’s Firepower Danger Protection (FTD) software, which is part of its suite of network security and visitors administration products and its Adaptive Security Equipment (ASA) software program, the functioning program for its loved ones of ASA corporate network security devices.

“An attacker could exploit this vulnerability by sending a crafted HTTP request that contains listing traversal character sequences to an affected gadget,” in accordance to a Wednesday advisory from Cisco. “A prosperous exploit could allow the attacker to look at arbitrary data files inside the web services file process on the targeted product.”

The vulnerability (CVE-2020-3452), which ranks 7.5 out of 10 on the CVSS scale, is thanks to a lack of appropriate enter validation of URLs in HTTP requests processed by impacted gadgets. Specifically, the vulnerability enables attackers to carry out listing traversal attacks, which is an HTTP attack enabling negative actors to access restricted directories and execute commands outside of the web server’s root directory.

“This vulnerability… is remarkably hazardous,” said Mikhail Klyuchnikov of Optimistic Technologies, who was credited with independently reporting the flaw (along with Ahmed Aboul-Ela of RedForce), in a assertion delivered to Threatpost. “The cause is a failure to sufficiently verify inputs. An attacker can ship a specifically crafted HTTP request to obtain entry to the file technique (RamFS), which shops info in RAM.”

A possible attacker can see information inside of the web companies file technique only. The web services file process is enabled for certain WebVPN and AnyConnect options (outlined in Cisco’s advisory). The web solutions files that the attacker can watch may have facts these types of as WebVPN configuration, bookmarks, web cookies, partial web information and HTTP URLs.

Cisco claimed the vulnerability has an effect on goods if they are operating a susceptible launch of Cisco ASA Software program or Cisco FTD Software program, with a susceptible AnyConnect or WebVPN configuration: “The web services file procedure is enabled when the influenced machine is configured with possibly WebVPN or AnyConnect features,” according to its advisory. However, “this vulnerability can not be made use of to obtain obtain to ASA or FTD procedure documents or underlying working procedure (OS) data files.”

To eliminate the vulnerability, Klyuchnikov urged Cisco consumers to update Cisco ASA to the most latest model. Cisco explained it’s not conscious of any malicious exploits for the vulnerability – nonetheless, it is knowledgeable of evidence-of-principle (POC) exploit code launched Wednesday by security researcher Ahmed Aboul-Ela.

Right here is POC of CVE-2020-3452, unauthenticated file study in Cisco ASA & Cisco Firepower.

For example to read “/+CSCOE+/portal_inc.lua” file.

https:///+CSCOT+/translation-table?variety=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../

Happy Hacking! pic.twitter.com/aBA3R7akkC

— Ahmed Aboul-Ela (@aboul3la) July 22, 2020

Before in Could, Cisco stomped out 12 substantial-severity vulnerabilities across its ASA and FTD network security items. The flaws could be exploited by unauthenticated remote attackers to start an array of attacks – from denial of assistance (DoS) to sniffing out sensitive data.



Previous Post: «Garmin Suffers Noted Ransomware Assault Garmin Suffers Noted Ransomware Assault
Next Post: Apple to send out research telephones to dependable hackers Apple To Send Out Research Telephones To Dependable Hackers»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.