Very recently, a new security vulnerability affecting Cisco ASA & Firepower was discovered. Below are the short details:
Background:
A vulnerability in the Simple Network Management Protocol (SNMP) code of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to a buffer overflow in the affected code area. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system. The attacker must know the SNMP community string to exploit this vulnerability.
Affected Products:
- Cisco ASA 5500 Series Adaptive Security Appliances
- Cisco ASA 5500-X Series Next-Generation Firewalls
- Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
- Cisco ASA 1000V Cloud Firewall
- Cisco Adaptive Security Virtual Appliance (ASAv)
- Cisco Firepower 4100 Series
- Cisco Firepower 9300 ASA Security Module
- Cisco Firepower Threat Defense Software
- Cisco Firewall Services Module (FWSM)*
- Cisco Industrial Security Appliance 3000
- Cisco PIX Firewalls
IOS Fix:
Cisco ASA Major Release | First Fixed Release |
7.2 | Affected; migrate to 9.1.7(9) or later |
8.0 | Affected; migrate to 9.1.7(9) or later |
8.1 | Affected; migrate to 9.1.7(9) or later |
8.2 | Affected; migrate to 9.1.7(9) or later |
8.3 | Affected; migrate to 9.1.7(9) or later |
8.4 | Affected; migrate to 9.1.7(9) or later |
8.5 | Affected; migrate to 9.1.7(9) or later |
8.6 | Affected; migrate to 9.1.7(9) or later |
8.7 | Affected; migrate to 9.1.7(9) or later |
9.0 | 9.0.4(40) ETA 8/25/2016 |
9.1 | 9.1.7(9) |
9.2 | 9.2.4(14) ETA 8/25/2016 |
9.3 | 9.3.3(10) ETA 8/26/2016 |
9.4 | 9.4.3(8) ETA 8/26/2016 |
9.5 | 9.5(3) |
9.6 | 9.6.1(11) / FTD 6.0.1(2) |
For up-to-date details of the vulnerability, kindly check the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp
For more information or assistance in patching the above vulnerability, don't hesitate to contact us through our call center on +961-1-511822.
--
Elie Bassil
linkedin.com/in/eliebassil
14 comments
Write commentsNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyNo more live link in this comments field
ReplyEmoticonEmoticon