Cisco Updates Vulnerabilities

Monday, April 13, 2015 @ 04:04 PM gHale

Updates for a security flaw in Cisco’s ASA FirePOWER and Context Aware (CX) Services are ready to go fixing vulnerabilities that could cause the system to reload and fall into a denial-of-service (DoS).

The glitch lies in the virtualization layer and can end up leveraged remotely by a bad guy without having to go through authentication.

Cisco Mitigates DoS Holes
Cisco Fixes Mulitple DoS Issues
Cisco IPv6 Processing Vulnerability
Risk with Custom VPN Portals

ASA FirePOWER Services provides automated protection against advanced threats all across the timeline of an attack. It integrates into Cisco’s ASA 5500-X Series Next-Generation Firewall products.

ASA CX Services is a complementary component that provides identification for the application and user in order to achieve increased visibility in the network and better network traffic control.

The DoS vulnerability affecting the products can occur because specially crafted packets sent at a high rate do not end up handled properly.

“An attacker could exploit this vulnerability by sending a high rate of crafted packets to the management interface of the Cisco ASA FirePOWER Services or Cisco ASA CX Services,” said the security advisory from the company.

Successful exploitation can occur only if the traffic aims at the management interface of the two products. However, the attack works regardless if it goes out via IPv4 or IPv6.

The flaw has the case number CVE-2015-0678 and has a CVSS score of 7.8.

Updates for the two products released by Cisco, with the recommendation users apply them without delay.

This is not the only glitch affecting ASA (Adaptive Security Appliance). Cisco said the software also has three other flaws.

A failover command injection (CVE-2015-0675) allows an attacker to gain control of active and standby failover units by sending specially crafted UDP packets directed to the failover interface IP address; the severity rating received is 8.3.

A DNS memory exhaustion (CVE-2015-0676, severity rating 7.1) that causes system instability and failure to forward traffic or process it. This condition can occur if a request goes to a Cisco ASA device, forcing it to generate a DNS request packet. The attack is successful if the request ends up intercepted and replied to with a malformed DNS packet.

The third vulnerability in ASA is VPN XML parser DoS (CVE-2015-0677) that received a 7.8 severity score. It allows a remote, unauthenticated individual to crash the WebVPN component. Some of the consequences are resetting all secured VPN connection and reloading the affecting system.

Leave a Reply

You must be logged in to post a comment.