- Joined
- May 18, 1997
- Messages
- 55,141
If you are a system admin and use Cisco's ASA OS for network security devices, well, there is an upcoming security issue with your security and you likely need to secure it this week, because the exploit goes public this weekend. This exploit will be attached to the Cisco WEBVPN feature and if exploited can give the attacker full control of the system. If you have any ASA or Firepower products, you need to get your ducks in line now and the bug applies to FTD 6.22. An thankfully there is a quick check you can run to determine if you have the issue with your system. Thanks to Monkey34 for the heads up!
This vulnerability affects devices that are running a vulnerable release of Cisco ASA Software where the webvpn feature is enabled. In addition to webvpn being globally configured there must be one enabled interface via the enable <if_name> in the configuration. To determine whether webvpn is enabled for at least one interface, administrators can use the show running-config webvpn command at the CLI and verify that the command returns at least one enable <if_name> line.
This vulnerability affects devices that are running a vulnerable release of Cisco ASA Software where the webvpn feature is enabled. In addition to webvpn being globally configured there must be one enabled interface via the enable <if_name> in the configuration. To determine whether webvpn is enabled for at least one interface, administrators can use the show running-config webvpn command at the CLI and verify that the command returns at least one enable <if_name> line.