Vulnerability identifier: #VU62670
Vulnerability risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-266
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco Adaptive Security Appliance (ASA)
Hardware solutions /
Security hardware applicances
Cisco Firepower Threat Defense (FTD)
Hardware solutions /
Security hardware applicances
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to improper separation of authentication and authorization scopes in the web services interface for remote access VPN feature. A remote authenticated user can send specially crafted HTTP requests to gain privilege level 15 access to the web management interface of the device
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Cisco Adaptive Security Appliance (ASA): before 9.8.4.43, 9.12.4.38, 9.14.4, 9.15.1.21, 9.16.2.13, 9.17.1.7, 9.8.4.43, 9.8.4.43
Cisco Firepower Threat Defense (FTD): before 6.4.0.15, 6.6.5.2, 6.7.0.4, 7.0.2, 7.1.0.1, 6.4.0.15, 6.4.0.15, 6.4.0.15, 6.4.0.15, 6.4.0.15
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-mgmt-privesc-BMFMUvye
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz92016
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.