First published: Wed Aug 07 2019(Updated: )
Multiple vulnerabilities in the smart tunnel functionality of Cisco Adaptive Security Appliance (ASA) could allow an authenticated, local attacker to elevate privileges to the root user or load a malicious library file while the tunnel is being established. For more information about these vulnerabilities, see the Details section of this security advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-asa-multi
Credit: Francesco Giordano Hacktive Security for reporting these vulnerabilities
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA Software | =9.12<9.12.2.1=9.10<9.10.1.22>=9.7=9.8<=9.9<9.10.1.22=9.6<9.6.4.30=9.5<9.6.4.30=9.4<9.4.4.37=Earlier than 9.4<9.4.4.37 | 9.12.2.1 9.10.1.22 9.10.1.22 9.6.4.30 9.6.4.30 9.4.4.37 9.4.4.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190807-asa-multi is classified as high due to the potential for privilege escalation.
To fix cisco-sa-20190807-asa-multi, upgrade to a fixed software version listed in the advisory.
The affected product is Cisco ASA Software with specific versions between 9.4 and 9.12.
No, only an authenticated local attacker can exploit the vulnerabilities in cisco-sa-20190807-asa-multi.
An attacker can elevate privileges to the root user or load a malicious library while establishing a smart tunnel.