• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cisco Network Security Flaw Leaks Sensitive Details

Cisco Network Security Flaw Leaks Sensitive Details

You are here: Home / Latest Cyber Security Vulnerabilities / Cisco Network Security Flaw Leaks Sensitive Details
July 23, 2020

The flaw exists in Cisco’s network security Firepower Menace Defense (FTD) application and its Adaptive Security Appliance (ASA) software.

A superior-severity vulnerability in Cisco’s network security application could lay bare delicate info – such as WebVPN configurations and web cookies –  to distant, unauthenticated attackers.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The flaw exists in the web services interface of Cisco’s Firepower Danger Protection (FTD) software, which is part of its suite of network security and visitors administration products and its Adaptive Security Equipment (ASA) software program, the functioning program for its loved ones of ASA corporate network security devices.

“An attacker could exploit this vulnerability by sending a crafted HTTP request that contains listing traversal character sequences to an affected gadget,” in accordance to a Wednesday advisory from Cisco. “A prosperous exploit could allow the attacker to look at arbitrary data files inside the web services file process on the targeted product.”

The vulnerability (CVE-2020-3452), which ranks 7.5 out of 10 on the CVSS scale, is thanks to a lack of appropriate enter validation of URLs in HTTP requests processed by impacted gadgets. Specifically, the vulnerability enables attackers to carry out listing traversal attacks, which is an HTTP attack enabling negative actors to access restricted directories and execute commands outside of the web server’s root directory.

“This vulnerability… is remarkably hazardous,” said Mikhail Klyuchnikov of Optimistic Technologies, who was credited with independently reporting the flaw (along with Ahmed Aboul-Ela of RedForce), in a assertion delivered to Threatpost. “The cause is a failure to sufficiently verify inputs. An attacker can ship a specifically crafted HTTP request to obtain entry to the file technique (RamFS), which shops info in RAM.”

A possible attacker can see information inside of the web companies file technique only. The web services file process is enabled for certain WebVPN and AnyConnect options (outlined in Cisco’s advisory). The web solutions files that the attacker can watch may have facts these types of as WebVPN configuration, bookmarks, web cookies, partial web information and HTTP URLs.

Cisco claimed the vulnerability has an effect on goods if they are operating a susceptible launch of Cisco ASA Software program or Cisco FTD Software program, with a susceptible AnyConnect or WebVPN configuration: “The web services file procedure is enabled when the influenced machine is configured with possibly WebVPN or AnyConnect features,” according to its advisory. However, “this vulnerability can not be made use of to obtain obtain to ASA or FTD procedure documents or underlying working procedure (OS) data files.”

To eliminate the vulnerability, Klyuchnikov urged Cisco consumers to update Cisco ASA to the most latest model. Cisco explained it’s not conscious of any malicious exploits for the vulnerability – nonetheless, it is knowledgeable of evidence-of-principle (POC) exploit code launched Wednesday by security researcher Ahmed Aboul-Ela.

Right here is POC of CVE-2020-3452, unauthenticated file study in Cisco ASA & Cisco Firepower.

For example to read “/+CSCOE+/portal_inc.lua” file.

https:///+CSCOT+/translation-table?variety=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../

Happy Hacking! pic.twitter.com/aBA3R7akkC

— Ahmed Aboul-Ela (@aboul3la) July 22, 2020

Before in Could, Cisco stomped out 12 substantial-severity vulnerabilities across its ASA and FTD network security items. The flaws could be exploited by unauthenticated remote attackers to start an array of attacks – from denial of assistance (DoS) to sniffing out sensitive data.



Previous Post: «Garmin Suffers Noted Ransomware Assault Garmin Suffers Noted Ransomware Assault
Next Post: Apple to send out research telephones to dependable hackers Apple To Send Out Research Telephones To Dependable Hackers»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Copyright © TheCyberSecurity.News, All Rights Reserved.