Pereiti prie turinio

Kalba Kalba

Blogai Blogai

« Atgal

Cisco patches ASA/FTD firewall flaw actively exploited by hackers

Cisco constant a excessive severity and actively exploited study-best course traversal vulnerability affecting the net offerings interface of of its firewall merchandise.
If efficiently exploited, the safety vulnerability tracked as CVE-2020-3452 might also additionally permit unauthenticated attackers to study touchy documents on unpatched structures via listing traversal attacks.
The impacted merchandise are Cisco Adaptive Security Appliance (ASA) Software — the OS for standalone appliances, blades, and digital equipment Cisco ASA gadgets used to shield records facilities and company networks — and the Cisco Firepower Threat Defense (FTD) Software — a unified software program presenting next-gen firewall offerings.
Provides get admission to best to documents at the net offerings report gadget
CVE-2020-3452 is due to an incorrect enter validation of URLs in HTTP requests which allowed attackers to make the most the vulnerability via way of means of sending in particular crafted HTTP requests with listing traversal individual sequences to affected gadgets.
Successful exploitation ought to permit far off attackers to study arbitrary documents at the centered gadgets, saved inside the net offerings report gadget this is best enabled whilst the impacted gadgets are configured with both AnyConnect or WebVPN features.
"The net offerings documents that the attacker can view might also additionally have facts which includes WebVPN configuration, bookmarks, net cookies, partial net content, and HTTP URLs," Cisco said.
However, as Cisco similarly explained, "this vulnerability can't be used to achieve get admission to to ASA or FTD gadget documents or underlying running gadget (OS) documents."
While no workarounds may be used to cope with this vulnerability, Cisco has launched unfastened safety updates for gadgets going for walks inclined variations of ASA/FTD Software.
CVE-2020-3452 turned into independently mentioned to Cisco via way of means of Mikhail Klyuchnikov of Positive Technologies, and Ahmed Aboul-Ela and Abdulrahman Nour of RedForce.
More info:    cisco firewall models
Trackback nuorodos URL :

Komentarų dar nėra. Būkite pirmuoju.