Article Details
Scrape Timestamp (UTC): 2024-10-24 12:46:11.878
Source: https://thehackernews.com/2024/10/cisco-issues-urgent-fix-for-asa-and-ftd.html
Original Article Text
Click to Toggle View
Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack. Cisco on Wednesday said it has released updates to address an actively exploited security flaw in its Adaptive Security Appliance (ASA) that could lead to a denial-of-service (DoS) condition. The vulnerability, tracked as CVE-2024-20481 (CVSS score: 5.8), affects the Remote Access VPN (RAVPN) service of Cisco ASA and Cisco Firepower Threat Defense (FTD) Software. Arising due to resource exhaustion, the security flaw could be exploited by unauthenticated, remote attackers to cause a DoS of the RAVPN service. "An attacker could exploit this vulnerability by sending a large number of VPN authentication requests to an affected device," Cisco said in an advisory. "A successful exploit could allow the attacker to exhaust resources, resulting in a DoS of the RAVPN service on the affected device." Restoration of the RAVPN service may require a reload of the device depending on the impact of the attack, the networking equipment company added. While there are no direct workarounds to address CVE-2024-20481, Cisco said customers can follow recommendations to counter password spraying attacks - It's worth noting that the flaw has put to use in a malicious context by threat actors as part of a large-scale brute-force campaign targeting VPNs, and SSH services. Earlier this April, Cisco Talos flagged a spike in brute-force attacks against Virtual Private Network (VPN) services, web application authentication interfaces, and SSH services since March 18, 2024. These attacks singled out a wide range of equipment from different companies, including Cisco, Check Point, Fortinet, SonicWall, MikroTik, Draytek, and Ubiquiti. "The brute-forcing attempts use generic usernames and valid usernames for specific organizations," Talos noted at the time. "These attacks all appear to be originating from TOR exit nodes and a range of other anonymizing tunnels and proxies." Cisco has also released patches to remediate three other critical flaws in FTD Software, Secure Firewall Management Center (FMC) Software, and Adaptive Security Appliance (ASA), respectively - With security vulnerabilities in networking devices emerging as a center point of nation-state exploitations, it's essential that users move quickly to apply the latest fixes.
Daily Brief Summary
Cisco has issued updates for a security flaw, CVE-2024-20481, in its ASA and FTD software that is currently being exploited, leading to potential denial-of-service (DoS) incidents.
The vulnerability, with a CVSS score of 5.8, affects the Remote Access VPN service and can cause service disruption by resource exhaustion.
Attackers can exploit this issue by flooding the VPN with excessive authentication requests, overwhelming the system and necessitating a device reload.
There are no direct workarounds for this vulnerability; however, Cisco advises on measures to prevent password spraying attacks.
The flaw is part of a broader pattern of brute-force attacks targeting VPNs and SSH services, beginning from March 18, 2024, that involve multiple vendors.
These brute-force campaigns have utilized generic and organization-specific usernames, originating from TOR exit nodes and other anonymizing services.
Alongside this fix, Cisco released patches for three other critical vulnerabilities across its FTD Software, Secure Firewall Management Center Software, and ASA.
Given the prevalence of these vulnerabilities in critical infrastructure, rapid application of these patches is vital to safeguard against potential nation-state attacks and other malicious activities.