Cisco ASA Exploited in the Wild; FXOS, NX-OS Get High-Priority Patches

Steve Tilson

Cisco released a high-severity patch update for CVE-2018-0296 on June 22 which affects the Adaptive Security Appliance (ASA). There’s no time to waste in deploying this patch, as the company’s advisory notes it is currently being exploited in the wild.

The ASA patch, which addresses the lack of proper input validation of the HTTP URL, is the latest in a long list of updates from Cisco this month. A slew of patches were issued June 6, followed by a whopping 34 patches on June 20, including five critical and 19 high-severity patches for its Firepower firewalls (FXOS) and Nexus switches (NX-OS). Another 10 medium-severity fixes also were issued this month for a variety of other Cisco systems.

The five critical vulnerabilities all scored a 9.8 CVSS v3 rating. Four of these addressed flaws with packet header processing. The fifth, CVE-2018-0301, affects  Cisco’s NX-OS Software NX-API.

Analysis

ASA (CVE-2018-0296)

This issue could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. Cisco states certain ASA software may not trigger a device reload, however an attacker could view sensitive system information without authentication by using directory traversal techniques. As of June 22, 2018, this issue has been seen being exploited in the wild and a Python directory traversal exploit was available on GitHub.

NX-OS / FXOS / NX-API (CVE-2018-0304, CVE-2018-0308, CVE-2018-0312, CVE-2018-0314, CVE-2018-0301)

According to Cisco, the first four critical CVEs all address a similar issue in Cisco Fabric Services. An unauthenticated, remote attacker could send a maliciously crafted Cisco Fabric Services packet to read protected memory, trigger a denial of service, or execute arbitrary code, leading to full system compromise.

As for the the fifth CVE, Cisco states: “The vulnerability is due to incorrect input validation in the authentication module of the NX-API subsystem. An attacker could exploit this vulnerability by sending a crafted HTTP or HTTPS packet to the management interface of an affected system with the NX-API feature enabled. An exploit could allow the attacker to execute arbitrary code as root.” According to the advisory, an attacker would require access to of one of the following enabled virtual port distribution channels (vPCs): CFSoFC, CFSoE, or CFSoIP. (Note: Only CFSoFC is enabled by default.)

Solution

Cisco has released patches for all listed CVE’s for the products affected at this time and advises customers to update immediately. Tenable is continuously monitoring to provide the necessary plugins to assist our clients.

Tenable® has released the following plugins to help our customers determine their Cyber Exposure gap.

 

Plugin ID

Description

110686

Cisco ASA Multiple Vulnerabilities (cisco-sa-20180606-asaftd)

110687

Cisco NX-OS Cisco Fabric Services Multiple Vulnerabilities.

110688

Cisco NX-OS NXAPI Multiple Vulnerabilities.

 

Additional Information

Read more >

Published on Jun 26, 2018

People also viewed

Enterprise Territory Manager - North Carolina & South Carolina

Raleigh North Carolina United States Raleigh, North Carolina, United States Sales Sales
Your Role:We are currently searching for an Enterprise Territory Manager. The Territory Manager shall develop business through existing and new clients in their region.Your Opportunity: Maintain and develop the existing client base through regiona...

Enterprise Territory Manager - North Carolina & South Carolina

Columbia South Carolina United States Columbia, South Carolina, United States Sales Sales
Your Role:We are currently searching for an Enterprise Territory Manager. The Territory Manager shall develop business through existing and new clients in their region.Your Opportunity: Maintain and develop the existing client base through regiona...

Technical Support Engineer

Columbia Maryland United States Columbia, Maryland, United States Technical Support Technical Support
Your Role:Tenable is looking for motivated individuals to join our Technical Support Team.  The Technical Support Engineer (TSE) is the first contact for all customers when they require technical assistance.  In a time when the next Spectre and Me...

Technical Support Technical Lead

Columbia Maryland United States Columbia, Maryland, United States Technical Support Technical Support
Your Role:The Technical Support Technical Lead provides advanced troubleshooting to Technical Support Engineers and to our customers. A Technical Support Technical Lead will handle difficult cases which require advanced product and technical knowl...

Technical Support Technical Lead

Columbia Maryland United States Columbia, Maryland, United States Technical Support Technical Support
Your Role:The Technical Support Technical Lead provides advanced troubleshooting to Technical Support Engineers and to our customers. A Technical Support Technical Lead will handle difficult cases which require advanced product and technical knowl...

Sr. Software Engineer - Python

Dublin Dublin Ireland Dublin, Ireland Research Research & Development
Your Role:Tenable is looking for a senior software engineer to join our team. This position will involve designing, developing, and maintaining an automated system for collecting vulnerability and threat information and using that data to generate...

We have big plans for continued global growth, and we’re looking for people who are creative, flexible and dedicated to helping us build something great – something that matters.