{"id":42213,"date":"2021-06-28T09:42:32","date_gmt":"2021-06-28T09:42:32","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=50a17e829e4dcfc12a4c35879cb4a796"},"modified":"2021-06-28T09:42:32","modified_gmt":"2021-06-28T09:42:32","slug":"cisco-flaw-under-attack-after-researchers-publish-exploit-poc","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/cisco-flaw-under-attack-after-researchers-publish-exploit-poc\/","title":{"rendered":"Cisco flaw under attack after researchers publish exploit PoC"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/keumars-afifi-sabet-0\">Keumars Afifi-Sabet<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">28 Jun, 2021<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p><a href=\"https:\/\/www.itpro.co.uk\/security\/hacking\/357971\/how-do-hackers-choose-their-targets\"  data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/security\/hacking\/357971\/how-do-hackers-choose-their-targets\">Hackers<\/a> are targeting a vulnerability in Cisco\u2019s Adaptive Security Appliance (ASA) after security researchers published a proof-of-concept (<span class=\"scayt-misspell-word\" data-scayt-word=\"PoC\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgfee889goozbuee\">PoC<\/span>) for a successful exploit.<\/p>\n<p>Positive Technologies SWARM, the security company\u2019s offensive research team, <a href=\"https:\/\/twitter.com\/ptswarm\/status\/1408050644460650502\"  data-cke-saved-href=\"https:\/\/twitter.com\/ptswarm\/status\/1408050644460650502\">published an exploit PoC<\/a>\u00a0for the flaw tracked as <span class=\"scayt-misspell-word\" data-scayt-word=\"CVE\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgfehhz3vdn154t0\">CVE<\/span>-2020-3580 last week. This was originally patched in October 2020 alongside <span class=\"scayt-misspell-word\" data-scayt-word=\"CVE\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgfeibejzhaztgmy\">CVE<\/span>-2020-3581 through to <span class=\"scayt-misspell-word\" data-scayt-word=\"CVE\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgff3rbf09gqbm3q\">CVE<\/span>-2020-3583.<\/p>\n<p><!--wysiwyg_see-related_plugin--><\/p>\n<p>\nThis issue, which is considered to be moderately severe, concerns multiple vulnerabilities in the web services interface of Cisco ASA software and Cisco Firepower Threat <span class=\"scayt-misspell-word\" data-scayt-word=\"Defense\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgff3ubv1q7n1010\">Defense<\/span> (<span class=\"scayt-misspell-word\" data-scayt-word=\"FTD\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgff3ubeucnlxxq2\">FTD<\/span>) software.\u00a0<\/p>\n<p>On unpatched systems, Cisco ASA\/<span class=\"scayt-misspell-word\" data-scayt-word=\"FTD\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgfekdii27lrbrwz\">FTD<\/span> software web services don\u2019t sufficiently validate user-supplied inputs. To exploit the bug successfully, hackers would need to convince a user on the interface to click on a <a href=\"https:\/\/www.itpro.co.uk\/network-internet\/web-browser\/356066\/google-experiments-with-shorter-domain-names\"  data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/network-internet\/web-browser\/356066\/google-experiments-with-shorter-domain-names\">malicious link<\/a>. The vulnerability is rated 6.1 out of ten on the <span class=\"scayt-misspell-word\" data-scayt-word=\"CVSS\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgfelignaqvto4y5\">CVSS<\/span> threat severity scale.<\/p>\n<p>Exploitation could allow an attacker to remotely conduct <a href=\"https:\/\/www.itpro.co.uk\/cross-site-scripting-xss\/34411\/what-is-cross-site-scripting-xss\"  data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/cross-site-scripting-xss\/34411\/what-is-cross-site-scripting-xss\">cross-site scripting (XSS) attacks<\/a> on affected devices that haven\u2019t been patched. Cisco ASA Software is the core operating system that powers the Cisco ASA family, comprising devices that offer firewall tools among other security-oriented services.<\/p>\n<p>Since the <span class=\"scayt-misspell-word\" data-scayt-word=\"PoC\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgfeezao5o7ulpdy\">PoC<\/span> was posted online, Positive Technologies researcher <a href=\"https:\/\/twitter.com\/__mn1__\/status\/1408064449835978760\"  data-cke-saved-href=\"https:\/\/twitter.com\/__mn1__\/status\/1408064449835978760\">Mikhail Klyuchnikov<\/a>\u00a0reported that many other researchers are also chasing bug bounties for this vulnerability. <a href=\"https:\/\/www.tenable.com\/blog\/cve-2020-3580-proof-of-concept-published-for-cisco-asa-flaw-patched-in-october\"  data-cke-saved-href=\"https:\/\/www.tenable.com\/blog\/cve-2020-3580-proof-of-concept-published-for-cisco-asa-flaw-patched-in-october\">Tenable researchers<\/a> have also reported that attacks are exploiting <span class=\"scayt-misspell-word\" data-scayt-word=\"CVE\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgfeezayrexeot6n\">CVE<\/span>-2020-3580.<\/p>\n<p>Cisco issued a patch for this flaw in October 2020, but the fix for <span class=\"scayt-misspell-word\" data-scayt-word=\"CVE\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgfefqrxq4sh0q1m\">CVE<\/span>-2020-3581 was only partial, and the company had to issue a second patch in April this year. As of last July, there were 85,000 ASA\/<span class=\"scayt-misspell-word\" data-scayt-word=\"FTD\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kqgfegj3jbaxi71a2\">FTD<\/span> devices distributed across the business landscape.\u00a0<\/p>\n<p>Cisco Adaptive Security Appliance (ASA) Software is the core operating system that powers the Cisco ASA family. It offers firewall tools for various ASA devices, with ASA Software also integrating with other critical security technologies to deliver security-oriented products.\u00a0<\/p>\n<p>Businesses are being advised to <a href=\"https:\/\/www.itpro.co.uk\/security\/27713\/the-importance-and-benefits-of-effective-patch-management\"  data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/security\/27713\/the-importance-and-benefits-of-effective-patch-management\">patch their systems<\/a> with the latest update to avoid falling victim to successful attacks. <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Keumars Afifi-Sabet<\/p>\n<p>        28 Jun, 2021    <\/p>\n<p>      Hackers are targeting a vulnerability in Cisco\u2019s Adaptive Security Appliance (ASA) after security researchers published a proof-of-concept (PoC) for a successful exploit.<br \/>\nPositive Technol&#8230;<\/p>\n","protected":false},"author":433,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-42213","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/433"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=42213"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42213\/revisions"}],"predecessor-version":[{"id":42214,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42213\/revisions\/42214"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=42213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=42213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=42213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}