Download our ungated guide to high-quality penetration testing.
Release Date (01-29-2018) CVE#-2018-0101
This vulnerability affects an unknown function of the SSL VPN component within the ASA. The vulnerability is triggered when an attacker attempts to double free a section of memory when the VPN component is active on the ASA. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system.
This vulnerability was discovered by a researcher who will be giving a talk on it on February 2nd, found in the references below. The impact to Cisco ASA platforms can range from the worst case of full control of the system to forcing the device to reboot. There are currently no known POCs or publicly utilized exploits for this vulnerability, therefore it’s important to patch during this time period.
There are currently patched versions for the 9.1, 9.2, 9.4, 9.6, 9.7, and 9.8 trains for the affected Cisco ASAs. While the official list from Cisco (seen below) lists 9.9.1.2 as the fix for the 9.9 major release train, this is currently not available and has been pushed back due to failures in regression testing. If you are currently on 9.9, NetWorks Group strongly recommends falling back to the newest available version in the 9.8.2 train, currently 9.8.2-17.
Cisco has identified that there are no defensive mitigations or workarounds for this vulnerability that do not entail hampering features or updating/downgrading the device. Disabling webvpn from access to the Outside or as a whole will mitigate the harm this vulnerability being exploited could cause, however this will also disable webvpn functionality.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1https://vuldb.com/?id.112635https://recon.cx/2018/brussels/talks/cisco.htmlNetWorks Group Managed Service Customers running affected products already have the recommended patch in place. As software fixes are released, NWG will contact each customer to arrange for an upgrade of the managed device.All other customers running an affected product should plan to implement any recommended defensive mitigations as soon as possible to address the issues in this advisory.If you have questions regarding this notice, please call us at 734-827-1400, option 3 or email NetWorks Group support.
Security news, tips, webinars, and more straight to your inbox.