Cisco Addresses Code execution and DoS Vulnerabilities
Cisco has issued three security advisories that address vulnerabilities within Cisco ASA and ASASM, their AnyConnect Secure Mobility Client, and Application Control Engine (ACE). According to their warnings, Cisco says that the issues could lead to code execution in some cases, or denial of service in others.
The most important of the vulnerability warnings from Cisco likely centers on the AnyConnect Secure Mobility Client. Tens of thousands of people use this VPN client to access their corporate networks every hour of the day.
“The vulnerabilities described in this advisory all are exploited via the software update mechanisms used to perform WebLaunch-initiated web deployment. All affected versions of Cisco AnyConnect Secure Mobility Client, regardless of how they were deployed onto end-user systems, are susceptible to exploitation,” Cisco warned.
“In addition, because the WebLaunch components are signed by Cisco and because of these vulnerabilities can allow for the arbitrary installation of malicious software, any end-user system that instantiates the vulnerable WebLaunch downloader components may be impacted, including systems that have never installed Cisco AnyConnect Secure Mobility Client.”
The first issue is related to code execution. According to the note, the ActiveX and Java components of the VPN client do not perform sufficient input validation. As a result, an attacker who tricked a user onto a malicious domain could exploit this face and execute the code with the privileges of the user’s web browser session.
These same flaws also allow an attacker to deliver older versions of the VPN client, signed by Cisco, which could introduce vulnerabilities to the software that were not present at the time the victim visited the attackers domain. This software downgrade vulnerability also applies to HostScan Desktop.
In all three cases, Cisco has issued fixes. Customers need only deploy the latest packages to their remote clients. The ASA / ASASM and ACE vulnerability and mitigation details are here, and here, respectively.
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
- US, Israel Provide Guidance on Securing Remote Access Software
- OWASP’s 2023 API Security Top 10 Refines View of API Risks
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
