Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

BDU:2024-03233

CVSS: 8.6
24.04.2024

Уязвимость веб-серверов управления микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Cisco Firepower Threat Defense (FTD), позволяющая нарушителю вызвать отказ в обслуживании

Уязвимость веб-серверов управления микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Cisco Firepower Threat Defense (FTD) связана с выполнением цикла с недоступным условием выхода. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании путём отправки специально сформированного HTTP-запроса
Статус уязвимости:
Подтверждена производителем
Уязвимость устранена
Дата выявления: 24.04.2024
Класс уязвимости: Уязвимость кода
Наличие эксплойта: Существует в открытом доступе
Способ эксплуатации: Исчерпание ресурсов
Способ устранения: Нет данных
Меры по устранению: Установка обновлений из доверенных источников.
В связи со сложившейся обстановкой и введенными санкциями против Российской Федерации рекомендуется устанавливать обновления программного обеспечения только после оценки всех сопутствующих рисков.

Компенсирующие меры:
- использование SIEM-систем и средств обнаружения вторжений для ограничения возможности несанкционированного доступа и отслеживания индикаторов компрометации;
- ограничение доступа к устройствам из внешних сетей (Интернет).

Использование рекомендаций производителя:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2
https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_attacks_event_response
Прочая информация: Для определения, является ли устройство с установленным программным обеспечением Cisco ASA или FTD уязвимым, используйте команду show asp table socket | include SSL и найдите SSL-слушающий сокет на любом TCP-порте. Если сокет присутствует в выводе, устройство следует считать уязвимым. Приведенный ниже пример показывает вывод для устройства Cisco ASA с двумя SSL-слушающими сокетами на TCP-портах 443 и 8443:

ciscoasa# show asp table socket | include SSL
SSL 00185038 LISTEN 172.16.0.250:443 0.0.0.0:*
SSL 00188638 LISTEN 10.0.0.250:8443 0.0.0.0:*


Конфигурация уязвимостей программного обеспечения ASA.

В следующем списке перечислены функции программного обеспечения Cisco ASA, которые могут быть уязвимыми. Признаки базовой конфигурации для каждой функции можно определить с помощью команды show running-config CLI. Эти функции могут привести к активации SSL-прослушивающих сокетов.

Функция программного обеспечения Cisco ASA : Возможная уязвимая конфигурация

AnyConnect IKEv2 Remote Access (with client services) :
crypto ikev2 enable [...] client-services port

Local Certificate Authority (CA) :
crypto ca server
no shutdown

Management Web Server Access (including ASDM and CSM) :
http server enable
http

Mobile User Security (MUS) :
webvpn
mus password
mus server enable port
mus

REST API :
rest-api image disk0:/rest-api agent

SSL VPN:
webvpn
enable


Конфигурация уязвимостей программного обеспечения FTD.

Ниже перечислены функции программного обеспечения Cisco FTD, которые могут быть уязвимыми. Признаки базовой конфигурации для каждой функции можно определить с помощью команды show running-config CLI. Эти функции могут привести к активации SSL-прослушивающих сокетов.

Функция программного обеспечения Cisco FTD : Возможная уязвимая конфигурация

AnyConnect IKEv2 Remote Access (with client services) :
crypto ikev2 enable [...] client-services port

AnyConnect SSL VPN :
webvpn
enable

HTTP server enabled :
http server enable
http

Идентификатор типа ошибки

Идентификатор, установленный в соответствии с общим перечнем ошибок CWE
Идентификатор Описание
CWE-835 Бесконечный цикл (зацикливание)

Идентификаторы CVE уязвимостей

Идентификатор, базы данных общеизвестных уязвимостей информационной безопасности
Идентификатор Описание
CVE-2024-20353 A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepowe...

CVSS

Система общей оценки уязвимостей
Оценка Severity Версия Базовый вектор
7.8 HIGH 2.0 AV:N/AC:L/Au:N/C:N/I:N/A:C
8.6 HIGH 3.0 AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Идентификаторы других систем описаний уязвимостей

CVE-2024-20353
Вендор:
  • Cisco Systems Inc.
Тип ПО:
  • ПО программно-аппаратного средства
  • ПО сетевого программно-аппаратного средства
Наименование ПО:
  • Firepower Threat Defense
  • Adaptive Security Appliance
Версия ПО:
  • 6.2.3 (Firepower Threat Defense)
  • 6.2.3.16 (Firepower Threat Defense)
  • 9.8.4.22 (Adaptive Security Appliance)
  • 9.8.4.25 (Adaptive Security Appliance)
  • 9.12.4.2 (Adaptive Security Appliance)
  • 9.14.1.15 (Adaptive Security Appliance)
  • 9.16.1 (Adaptive Security Appliance)
  • 7.0.0 (Firepower Threat Defense)
  • 7.2.0 (Firepower Threat Defense)
  • 7.2.0.1 (Firepower Threat Defense)
  • 9.14.1 (Adaptive Security Appliance)
  • 9.14.1.10 (Adaptive Security Appliance)
  • 9.14.1.19 (Adaptive Security Appliance)
  • 9.14.1.30 (Adaptive Security Appliance)
  • 9.14.2 (Adaptive Security Appliance)
  • 9.14.2.4 (Adaptive Security Appliance)
  • 9.14.2.8 (Adaptive Security Appliance)
  • 9.14.2.13 (Adaptive Security Appliance)
  • 9.14.2.15 (Adaptive Security Appliance)
  • 9.14.3 (Adaptive Security Appliance)
  • 9.14.3.1 (Adaptive Security Appliance)
  • 9.14.3.9 (Adaptive Security Appliance)
  • 9.14.3.13 (Adaptive Security Appliance)
  • 9.14.3.15 (Adaptive Security Appliance)
  • 9.14.3.18 (Adaptive Security Appliance)
  • 9.15.1 (Adaptive Security Appliance)
  • 9.15.1.1 (Adaptive Security Appliance)
  • 9.15.1.7 (Adaptive Security Appliance)
  • 9.15.1.10 (Adaptive Security Appliance)
  • 9.15.1.21 (Adaptive Security Appliance)
  • 6.6.0 (Firepower Threat Defense)
  • 6.6.0.1 (Firepower Threat Defense)
  • 6.6.1 (Firepower Threat Defense)
  • 6.6.3 (Firepower Threat Defense)
  • 6.6.4 (Firepower Threat Defense)
  • 6.6.5 (Firepower Threat Defense)
  • 6.6.5.1 (Firepower Threat Defense)
  • 6.6.5.2 (Firepower Threat Defense)
  • 7.0.0.1 (Firepower Threat Defense)
  • 7.0.1 (Firepower Threat Defense)
  • 7.0.1.1 (Firepower Threat Defense)
  • 7.0.2 (Firepower Threat Defense)
  • 7.0.2.1 (Firepower Threat Defense)
  • 7.0.3 (Firepower Threat Defense)
  • 7.0.4 (Firepower Threat Defense)
  • 7.1.0.1 (Firepower Threat Defense)
  • 7.1.0.2 (Firepower Threat Defense)
  • 9.8.1 (Adaptive Security Appliance)
  • 9.8.1.5 (Adaptive Security Appliance)
  • 9.8.1.7 (Adaptive Security Appliance)
  • 9.8.2 (Adaptive Security Appliance)
  • 9.8.2.8 (Adaptive Security Appliance)
  • 9.8.2.14 (Adaptive Security Appliance)
  • 9.8.2.15 (Adaptive Security Appliance)
  • 9.8.2.17 (Adaptive Security Appliance)
  • 9.8.2.20 (Adaptive Security Appliance)
  • 9.8.2.24 (Adaptive Security Appliance)
  • 9.8.2.26 (Adaptive Security Appliance)
  • 9.8.2.28 (Adaptive Security Appliance)
  • 9.8.2.33 (Adaptive Security Appliance)
  • 9.8.2.35 (Adaptive Security Appliance)
  • 9.8.2.38 (Adaptive Security Appliance)
  • 9.8.3 (Adaptive Security Appliance)
  • 9.8.3.8 (Adaptive Security Appliance)
  • 9.8.3.11 (Adaptive Security Appliance)
  • 9.8.3.14 (Adaptive Security Appliance)
  • 9.8.3.16 (Adaptive Security Appliance)
  • 9.8.3.18 (Adaptive Security Appliance)
  • 9.8.3.21 (Adaptive Security Appliance)
  • 9.8.3.26 (Adaptive Security Appliance)
  • 9.8.3.29 (Adaptive Security Appliance)
  • 9.8.4 (Adaptive Security Appliance)
  • 9.8.4.3 (Adaptive Security Appliance)
  • 9.8.4.7 (Adaptive Security Appliance)
  • 9.8.4.8 (Adaptive Security Appliance)
  • 9.8.4.10 (Adaptive Security Appliance)
  • 9.8.4.12 (Adaptive Security Appliance)
  • 9.8.4.15 (Adaptive Security Appliance)
  • 9.8.4.17 (Adaptive Security Appliance)
  • 9.14.3.11 (Adaptive Security Appliance)
  • 9.14.4.6 (Adaptive Security Appliance)
  • 9.14.4 (Adaptive Security Appliance)
  • 9.14.4.7 (Adaptive Security Appliance)
  • 9.14.4.12 (Adaptive Security Appliance)
  • 9.15.1.15 (Adaptive Security Appliance)
  • 9.15.1.16 (Adaptive Security Appliance)
  • 9.15.1.17 (Adaptive Security Appliance)
  • 9.16.3 (Adaptive Security Appliance)
  • 9.16.3.3 (Adaptive Security Appliance)
  • 9.16.3.14 (Adaptive Security Appliance)
  • 9.17.1 (Adaptive Security Appliance)
  • 9.17.1.7 (Adaptive Security Appliance)
  • 9.17.1.9 (Adaptive Security Appliance)
  • 9.17.1.10 (Adaptive Security Appliance)
  • 9.17.1.11 (Adaptive Security Appliance)
  • 9.17.1.13 (Adaptive Security Appliance)
  • 9.17.1.15 (Adaptive Security Appliance)
  • 9.18.1 (Adaptive Security Appliance)
  • 6.6.7 (Firepower Threat Defense)
  • 9.16.1.28 (Adaptive Security Appliance)
  • 9.16.2 (Adaptive Security Appliance)
  • 9.16.2.3 (Adaptive Security Appliance)
  • 9.16.2.7 (Adaptive Security Appliance)
  • 9.16.2.11 (Adaptive Security Appliance)
  • 9.16.2.13 (Adaptive Security Appliance)
  • 9.16.2.14 (Adaptive Security Appliance)
  • 9.16.3.15 (Adaptive Security Appliance)
  • 9.16.3.19 (Adaptive Security Appliance)
  • 9.16.3.23 (Adaptive Security Appliance)
  • 9.16.4 (Adaptive Security Appliance)
  • 9.16.4.9 (Adaptive Security Appliance)
  • 9.17.1.20 (Adaptive Security Appliance)
  • 9.18.1.3 (Adaptive Security Appliance)
  • 9.18.2 (Adaptive Security Appliance)
  • 9.18.2.5 (Adaptive Security Appliance)
  • 9.18.2.7 (Adaptive Security Appliance)
  • 9.19.1 (Adaptive Security Appliance)
  • 7.0.5 (Firepower Threat Defense)
  • 7.1.0.3 (Firepower Threat Defense)
  • 7.2.1 (Firepower Threat Defense)
  • 7.2.2 (Firepower Threat Defense)
  • 7.2.3 (Firepower Threat Defense)
  • 7.3.0 (Firepower Threat Defense)
  • 7.3.1 (Firepower Threat Defense)
  • 7.3.1.1 (Firepower Threat Defense)
  • 7.2.4 (Firepower Threat Defense)
  • 9.8.4.20 (Adaptive Security Appliance)
  • 9.8.4.26 (Adaptive Security Appliance)
  • 9.8.4.29 (Adaptive Security Appliance)
  • 9.12.1 (Adaptive Security Appliance)
  • 9.12.1.2 (Adaptive Security Appliance)
  • 9.12.1.3 (Adaptive Security Appliance)
  • 9.12.2 (Adaptive Security Appliance)
  • 9.12.2.1 (Adaptive Security Appliance)
  • 9.12.2.4 (Adaptive Security Appliance)
  • 9.12.2.5 (Adaptive Security Appliance)
  • 9.12.2.9 (Adaptive Security Appliance)
  • 9.12.3 (Adaptive Security Appliance)
  • 9.12.3.2 (Adaptive Security Appliance)
  • 9.12.3.7 (Adaptive Security Appliance)
  • 9.12.3.9 (Adaptive Security Appliance)
  • 9.12.4 (Adaptive Security Appliance)
  • 9.12.4.4 (Adaptive Security Appliance)
  • 9.12.4.7 (Adaptive Security Appliance)
  • 9.12.4.8 (Adaptive Security Appliance)
  • 9.12.4.10 (Adaptive Security Appliance)
  • 9.12.4.13 (Adaptive Security Appliance)
  • 9.12.4.18 (Adaptive Security Appliance)
  • 9.12.4.24 (Adaptive Security Appliance)
  • 9.12.4.26 (Adaptive Security Appliance)
  • 9.12.4.29 (Adaptive Security Appliance)
  • 9.12.4.30 (Adaptive Security Appliance)
  • 9.12.4.35 (Adaptive Security Appliance)
  • 9.14.1.6 (Adaptive Security Appliance)
  • 9.8.4.32 (Adaptive Security Appliance)
  • 9.8.4.33 (Adaptive Security Appliance)
  • 9.8.4.34 (Adaptive Security Appliance)
  • 9.8.4.35 (Adaptive Security Appliance)
  • 9.8.4.39 (Adaptive Security Appliance)
  • 9.8.4.40 (Adaptive Security Appliance)
  • 9.8.4.41 (Adaptive Security Appliance)
  • 9.8.4.43 (Adaptive Security Appliance)
  • 9.8.4.44 (Adaptive Security Appliance)
  • 9.8.4.45 (Adaptive Security Appliance)
  • 9.8.4.46 (Adaptive Security Appliance)
  • 9.8.4.48 (Adaptive Security Appliance)
  • 9.12.3.12 (Adaptive Security Appliance)
  • 9.12.4.37 (Adaptive Security Appliance)
  • 9.12.4.38 (Adaptive Security Appliance)
  • 9.12.4.39 (Adaptive Security Appliance)
  • 9.12.4.40 (Adaptive Security Appliance)
  • 9.12.4.41 (Adaptive Security Appliance)
  • 9.12.4.47 (Adaptive Security Appliance)
  • 9.12.4.48 (Adaptive Security Appliance)
  • 9.12.4.50 (Adaptive Security Appliance)
  • 9.12.4.52 (Adaptive Security Appliance)
  • 9.12.4.54 (Adaptive Security Appliance)
  • 9.12.4.55 (Adaptive Security Appliance)
  • 9.12.4.56 (Adaptive Security Appliance)
  • 9.14.4.13 (Adaptive Security Appliance)
  • 9.14.4.14 (Adaptive Security Appliance)
  • 9.14.4.15 (Adaptive Security Appliance)
  • 9.14.4.17 (Adaptive Security Appliance)
  • 9.14.4.22 (Adaptive Security Appliance)
  • 9.14.4.23 (Adaptive Security Appliance)
  • 9.16.4.14 (Adaptive Security Appliance)
  • 9.16.4.18 (Adaptive Security Appliance)
  • 9.17.1.30 (Adaptive Security Appliance)
  • 9.18.2.8 (Adaptive Security Appliance)
  • 9.18.3 (Adaptive Security Appliance)
  • 9.19.1.5 (Adaptive Security Appliance)
  • 9.19.1.9 (Adaptive Security Appliance)
  • 6.2.3.3 (Firepower Threat Defense)
  • 6.2.3.4 (Firepower Threat Defense)
  • 6.2.3.5 (Firepower Threat Defense)
  • 6.2.3.6 (Firepower Threat Defense)
  • 6.2.3.7 (Firepower Threat Defense)
  • 6.2.3.8 (Firepower Threat Defense)
  • 6.2.3.9 (Firepower Threat Defense)
  • 6.2.3.10 (Firepower Threat Defense)
  • 6.2.3.11 (Firepower Threat Defense)
  • 6.2.3.12 (Firepower Threat Defense)
  • 6.2.3.13 (Firepower Threat Defense)
  • 6.2.3.14 (Firepower Threat Defense)
  • 6.2.3.15 (Firepower Threat Defense)
  • 6.2.3.17 (Firepower Threat Defense)
  • 6.2.3.18 (Firepower Threat Defense)
  • 6.4.0.1 (Firepower Threat Defense)
  • 6.4.0.2 (Firepower Threat Defense)
  • 6.4.0.3 (Firepower Threat Defense)
  • 6.4.0.4 (Firepower Threat Defense)
  • 6.4.0.5 (Firepower Threat Defense)
  • 6.4.0.6 (Firepower Threat Defense)
  • 6.4.0.7 (Firepower Threat Defense)
  • 6.4.0.8 (Firepower Threat Defense)
  • 6.4.0.9 (Firepower Threat Defense)
  • 6.4.0.10 (Firepower Threat Defense)
  • 6.4.0.11 (Firepower Threat Defense)
  • 6.4.0.12 (Firepower Threat Defense)
  • 6.4.0.13 (Firepower Threat Defense)
  • 6.4.0.14 (Firepower Threat Defense)
  • 6.4.0.15 (Firepower Threat Defense)
  • 6.4.0.16 (Firepower Threat Defense)
  • 6.6.7.1 (Firepower Threat Defense)
  • 6.7.0 (Firepower Threat Defense)
  • 6.7.0.1 (Firepower Threat Defense)
  • 6.7.0.2 (Firepower Threat Defense)
  • 6.7.0.3 (Firepower Threat Defense)
  • 7.1.0 (Firepower Threat Defense)
  • 6.2.3.1 (Firepower Threat Defense)
  • 6.2.3.2 (Firepower Threat Defense)
  • 9.12.4.58 (Adaptive Security Appliance)
  • 9.16.4.19 (Adaptive Security Appliance)
  • 9.16.4.27 (Adaptive Security Appliance)
  • 9.18.3.39 (Adaptive Security Appliance)
  • 9.18.3.46 (Adaptive Security Appliance)
  • 9.19.1.12 (Adaptive Security Appliance)
  • 7.0.6 (Firepower Threat Defense)
  • 9.16.4.38 (Adaptive Security Appliance)
  • 9.18.3.53 (Adaptive Security Appliance)
  • 9.18.3.55 (Adaptive Security Appliance)
  • 9.19.1.18 (Adaptive Security Appliance)
  • 7.2.4.1 (Firepower Threat Defense)
  • 7.2.5 (Firepower Threat Defense)
  • 9.12.4.62 (Adaptive Security Appliance)
  • 9.12.4.65 (Adaptive Security Appliance)
  • 9.16.4.39 (Adaptive Security Appliance)
  • 9.16.4.42 (Adaptive Security Appliance)
  • 9.16.4.48 (Adaptive Security Appliance)
  • 9.16.4.55 (Adaptive Security Appliance)
  • 9.17.1.33 (Adaptive Security Appliance)
  • 9.18.3.56 (Adaptive Security Appliance)
  • 9.18.4 (Adaptive Security Appliance)
  • 9.18.4.5 (Adaptive Security Appliance)
  • 9.18.4.8 (Adaptive Security Appliance)
  • 9.19.1.22 (Adaptive Security Appliance)
  • 9.19.1.24 (Adaptive Security Appliance)
  • 9.19.1.27 (Adaptive Security Appliance)
  • 9.20.1 (Adaptive Security Appliance)
  • 9.20.1.5 (Adaptive Security Appliance)
  • 9.20.2 (Adaptive Security Appliance)
  • 6.4.0.17 (Firepower Threat Defense)
  • 7.0.6.1 (Firepower Threat Defense)
  • 7.2.5.1 (Firepower Threat Defense)
  • 7.4.0 (Firepower Threat Defense)
  • 7.4.1 (Firepower Threat Defense)
ОС и аппаратные платформы:
  • - (-)
Ссылки на источники:

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.