Lucene search

K
thnThe Hacker NewsTHN:E61FB01ED36F5A39FD247813F1A893BD
HistoryJun 28, 2021 - 6:39 a.m.

Cisco ASA Flaw Under Active Attack After PoC Exploit Posted Online

2021-06-2806:39:00
The Hacker News
thehackernews.com
581

0.974 High

EPSS

Percentile

99.9%

Cisco ASA

A security vulnerability in Cisco Adaptive Security Appliance (ASA) that was addressed by the company last October, and again earlier this April, has been subjected to active in-the-wild attacks following the release of proof-of-concept (PoC) exploit code.

The PoC was published by researchers from cybersecurity firm Positive Technologies on June 24, following which reports emerged that attackers are chasing after an exploit for the bug.

โ€œTenable has also received a report that attackers are exploiting CVE-2020-3580 in the wild,โ€ the cyber exposure company said.

Cisco ASA Exploit

Tracked as CVE-2020-3580 (CVSS score: 6.1), the issue concerns multiple vulnerabilities in the web services interface of Cisco ASA software and Cisco Firepower Threat Defense (FTD) software that could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks on an affected device.

As of July 2020, there were a little over 85,000 ASA/FTD devices, 398 of which are spread across 17% of the Fortune 500 companies, according to cybersecurity company Rapid7.

Successful exploitation, such as scenarios where a user of the interface is convinced to click a specially-crafted link, could permit the adversary to execute arbitrary JavaScript code in the context of the interface or access sensitive, browser-based information.

Although Cisco remediated the flaw in October 2020, the network equipment company subsequently determined the fix to be โ€œincomplete,โ€ thereby requiring a second round of patches that were released on April 28, 2021.

In light of public PoC availability, itโ€™s recommended that organizations prioritize patching CVE-2020-3580 to mitigate the risk associated with the flaw.

Found this article interesting? Follow THN on Facebook, Twitter ๏‚™ and LinkedIn to read more exclusive content we post.