Remote code execution in Cisco ASA Appliances



Published: 2016-08-18 | Updated: 2017-03-24
Risk Critical
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-6366
CWE-ID CWE-119
Exploitation vector Network
Public exploit This vulnerability is being exploited in the wild.
Vulnerable software
Subscribe
Cisco ASA 5500
Hardware solutions / Security hardware applicances

Cisco ASA 5580
Hardware solutions / Security hardware applicances

Cisco Catalyst 6500 Series ASA Services Module
Hardware solutions / Security hardware applicances

Cisco ASA 5500-X Series
Hardware solutions / Security hardware applicances

Cisco ASA 1000V Cloud Firewall
Hardware solutions / Security hardware applicances

Cisco ASA Series
Hardware solutions / Security hardware applicances

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one critical risk vulnerability.

1) SNMP remote code execution

EUVDB-ID: #VU324

Risk: Critical

CVSSv3.1: 9.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2016-6366

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when handling SNMP packets. A remote attacker with knowledge of SNMP community string can cause buffer overflow and cause the target device to reload or execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in full compromise of affected system.

The following models of CISCO ASA appliances are affected:

  • Cisco ASA 5500 Series Adaptive Security Appliances
  • Cisco ASA 5500-X Series Next-Generation Firewalls
  • Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
  • Cisco ASA 1000V Cloud Firewall
  • Cisco Adaptive Security Virtual Appliance (ASAv)
  • Cisco Firepower 9300 ASA Security Module
  • Cisco PIX Firewalls
  • Cisco Firewall Services Module (FWSM)

Note: this is a zero-day vulnerability, discovered after security breach of The Equation Group. The exploit code for this vulnerability was publicly exposed and is referred as EXTRABACON Exploit.

Mitigation

Install patches from vendor's website.

Vulnerable software versions

Cisco ASA 5500: 7.2.5 - 8.4.x

Cisco ASA 5580: 8.1.2

Cisco Catalyst 6500 Series ASA Services Module: All versions

Cisco ASA 5500-X Series: 8.6.x

Cisco ASA 1000V Cloud Firewall : 8.7.1

Cisco ASA Series: 9.0.x - 9.6.x

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp
http://blogs.cisco.com/security/shadow-brokers


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###