Thursday, March 30, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Cisco fixes ASA and Firepower solutions

Cisco fixes ASA and Firepower solutions

Cisco released patches that address various high-severity vulnerabilities affecting its ASA and Firepower solutions.


Erdem Yasar Erdem Yasar
August 15, 2022
3 min read
Cisco fixes ASA and Firepower solutions
  • Cisco announced that the company fixed multiple vulnerabilities affecting its Adaptive Security Appliance Software and Firepower Defense Software.
  • The vulnerabilities could allow attackers to execute arbitrary code, steal RSA private key, or cause a denial of service by restarting the device.
  • There is currently no known workaround for the vulnerabilities and no incidents show that the vulnerabilities are being attacked.

Cisco announced that fixes for various vulnerabilities affecting its Adaptive Security Appliance Software and Firepower Defense Software are now patched and urges users to apply the patches as soon as possible. Some of those vulnerabilities have high severity CVSS scores. Two vulnerabilities, CVE-2022-20829, CVE-2022-20866, and CVE-2022-20715 have CVSS scores of 9.1, 7.4, and 8.6 respectively. 

Arbitrary code execution and more

One of the vulnerabilities, CVE-2022-20829, is found in the packaging of Cisco Adaptive Security Device Manager images. Validation of the images by Adaptive Security Appliance Software can allow authenticated remote attackers to upload ASDM images containing malicious codes. The attacker should have administrative privileges to exploit the vulnerability. It is caused by the insufficient validation of the authenticity. The vulnerability affects:

  • The device was running a Cisco ASA Software release earlier than Release 9.16.3.19, earlier than Release 9.17.1.13, or earlier than Release 9.18.2.
  • The device was configured with a Cisco ASDM release earlier than Release 7.18.1.152.
  • The Cisco ASDM image was using a Cisco ASDM-IDM Launcher release earlier than Release 1.9(5).
  • The device was configured for HTTPS management access.

There are no known workarounds for the vulnerability and is fixed in Cisco ASA versions 9.8.4.45, 9.12.4.49, 9.14.4.14, 9.16.3.19, 9.17.1.13, and 9.18.2, ASDM version 7.18.1.152.

RSA private key leak vulnerability, tracked as CVE-2022-2086, is caused by a logic error when the RSA key is stored in memory on a hardware platform that performs hardware-based cryptography. It can be exploited with a Lenstra side-channel attack and allows attackers to retrieve the RSA private key. Cisco stated that this vulnerability applies to approximately 5 percent of the RSA keys on a vulnerable device. It affects Cisco products that are performing hardware-based cryptographic functions if they are running a vulnerable release of Cisco ASA Software or Cisco FTD Software:

  • ASA 5506-X with FirePOWER Services
  • ASA 5506H-X with FirePOWER Services
  • ASA 5506W-X with FirePOWER Services
  • ASA 5508-X with FirePOWER Services
  • ASA 5516-X with FirePOWER Services
  • Firepower 1000 Series Next-Generation Firewall
  • Firepower 2100 Series Security Appliances
  • Firepower 4100 Series Security Appliances
  • Firepower 9300 Series Security Appliances
  • Secure Firewall 3100

The vulnerability is fixed in ASA Software versions 9.16.3.19, 9.17.1.13, and 9.18.2 and FTD Software versions 7.0.4, Cisco_FTD_Hotfix_P-7.1.0.2-2.sh.REL.tar, Cisco_FTD_SSP_FP1K_Hotfix_P-7.1.0.2-2.sh.REL.tar, Cisco_FTD_SSP_FP2K_Hotfix_P-7.1.0.2-2.sh.REL.tar, Cisco_FTD_SSP_Hotfix_P-7.1.0.2-2.sh.REL.tar, Cisco_FTD_SSP_FP3K_Hotfix_Q-7.1.0.3-2.sh.REL.tar, and 7.2.0.1.  

The other high-severity vulnerability, CVE-2022-20715, is found in the remote access SSL VPN features of Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software. It allows a remote attacker to cause a denial of service. It is caused by improper validation of errors that are logged as a result of client connections that are made using remote access VPN. It can be exploited by sending crafted requests, causing the device to restart. It affects Cisco products that run vulnerable releases of Cisco ASA Software or FTD Software and have a vulnerable AnyConnect or WebVPN configuration. 

Cisco also confirmed that the company suffered a data breach recently. The investigation showed that employees’ credentials were compromised. The alleged files, 2.75 GB of stolen data, are published online by a group named Yanluowang.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Cisco SystemsVulnerability
Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7, Erdem was the managing editor of T3 Magazine.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
SparkyLinux 6.4 “Po Tolo” is now available

SparkyLinux 6.4 "Po Tolo" is now available

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • Trisquel GNU/Linux 11.0 review
  • What is continuous testing in DevOps?
  • [Event] FOSSASIA Summit 2023 – Get your discounted ticket now
  • What is browser automation: Getting started guide
  • 7 best live chat plugins for WordPress

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.