Last Updated: 2018-01-31 15:35:06 UTC
by Kevin Liston (Version: 2)
Before I get too many "I'm surprised/disappointed you haven't mentioned..." emails let's get out a rough draft on CVE-2018-0101.
What is it? A Base CVSS of 10 remote code execution and denial of service vulnerability affecting Cisco ASA devices with webvpn configured with SSL support.
What's the hurry? Details of the exploit research will be presented this weekend at Recon in Brussels. So it's getting some press. Also, CISCO released the advisory yesterday so people who are into that sort of thing are writing their own tests and scanners and exploits.
How do I know if I'm affected? I don't own one of these, so I don't have a great answer. Do you have a CISCO ASA? (check your inventory) Do you have webvpn configured? (check your config) Does it support SSL or is it TLS support only? (check your config)
I have one of these set up this way, now what do I do? Upgrade to the 9.6 branch and patch.
I can't do that for reasons, what do I do? Reduce the exposure by blocking un-needed networks.
Very funny, it's a vpn, I need that open to the Internet. Do you really need it open to the ENTIRE Internet?
Yes, I'm a <industry> and <reasons> Okay, if you can't patch, and you can't block, then you must monitor.
Alright, how do I do that? I'm going to have to get back to you on that. Update: You may want to look at these proposed IDS signatures: https://gist.github.com/fox-srt/09401dfdfc15652b22956b9cc59f71cb