Cisco Announces Critical Security Vulnerability for WebVPN Devices
The new year is not even 1 month old and we already have our second serious security vulnerability of 2018. Right on the heels of the Meltdown and Spectre security bugs, we now have a security advisory issued by Cisco concerning devices configured with WebVPN.
According to the advisory, which the company has labeled as a “critical flaw”, the vulnerability lies in the SSL (Secure Sockets Layer) of Cisco Adaptive Security Appliance (ASA) devices. If exploited, this vulnerability could allow a hacker to take remote control of a system. As such, this vulnerability should be considered very high risk.
The following hardware is affected by this vulnerability:
- 3000 Series ISA (Industrial Security Appliance)
- 5500 ASA (Adaptive Security Appliance)
- 5500 X Series Next-Generation Firewalls
- Adaptive Security Virtual Appliance
- ASA 1000V Cloud Firewall
- ASA Services Module for Cisco Catalyst 6500 Series Switches
- Cisco 7600 Series Routers
- Firepower 2100 Series Security Appliance
- Firepower 4110 Security Appliance
- Firepower 9300 ASA Security Module
- Firepower Threat Defense Software (Versions prior to 6.2.2 aren’t affected by this vulnerability)
To identify and track down devices running the vulnerable version of the software, you should view the Alert Post that Cisco has published for this vulnerability here.
According to Cisco, there is no workaround for this vulnerability. The affected devices should apply the patch it has already issued.
If you have any questions or concerns about these vulnerabilities, to request assistance with remediating these or other vulnerabilities, or to learn more about our server, desktop, and 3rd party patching and managed services programs, please contact us.