Cisco announced Monday a critical vulnerability in its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) that allows an unauthenticated, remote attacker to execute code or cause a system reload. This flaw, a perfect 10.0 on Common Vulnerability Scoring System, tops out as the highest warning possible. The products a popular group of security devices designed to protect corporate networks and data centers. Users are urged to apply security updates that fix the issue. “The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device,” Cisco explained in the Monday announcement. “An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device.” The vulnerability was found by Cedric […]
The post Cisco patches a perfect 10.0 ‘critical’ flaw in its popular security appliance appeared first on Cyberscoop.
Continue reading Cisco patches a perfect 10.0 ‘critical’ flaw in its popular security appliance→