CVE-2018-0296: Severe Flaw in Cisco ASA and Firepower Currently Exploited
CYBER NEWS

CVE-2018-0296 Severe Flaw in Cisco ASA and Firepower Currently Exploited

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

A new vulnerability, CVE-2018-0296, rated high-severe is affecting Cisco ASA and Firepower security appliances. The flaw is being exploited in the wild after an exploit of it showed up online a few days ago.

CVE-2018-0296 Official Description

A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques.

CVE-2018-0296 is triggered by the lack of proper input validation of the HTTP URL. An attacker could exploit the vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. It should also be noted that this vulnerability applies to IPv4 and IPv6 HTTP traffic.




The CVE-2018-0296 vulnerability affects Cisco ASA software and Cisco Firepower Threat Defense (FTD) software, running on the following Cisco products:

3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029.

Cisco strongly recommends that customers upgrade to a fixed Cisco ASA software release to remediate this issue,” the company said in the underlying advisory. No workarounds are available for this vulnerability. Users that haven’t implemented the patches yet are urged to do so now.

This is not the only vulnerability disclosed in Cisco products – there have been a number of flaws in Cisco switches, next generation firewalls and even security appliances.

Related Story: CVE-2018-0171- Small Instant Client Bug In Thousands of Cisco Switches
Related Story: 3,500 Cisco Network Switches in Iran Hacked by JHT Hacking Group
Avatar

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles!

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...