Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Services Client-Side Request Smuggling Vulnerability
A vulnerability in the VPN web services component of Cisco Secure Firewall ASA and Threat Defense software allows an unauthenticated remote attacker to conduct browser-based attacks against users accessing VPN web portals. The vulnerability is caused by improper validation of HTTP requests in the web services component. An attacker can craft a malicious website that, when visited by an authenticated user, sends specially formed HTTP requests to the firewall. Because the requests are not properly validated, the firewall reflects the attacker's malicious input back to the user's browser, enabling cross-site scripting (XSS) and other browser-based attacks. The attacker cannot directly compromise the firewall itself, but can manipulate user sessions and capture sensitive information displayed in the browser.
- User must visit attacker-controlled website while authenticated to VPN web services
- VPN web services endpoints must be enabled on the firewall
- User must be using a web browser
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6c900e6b-6b9e-461f-99b2-d173de395464Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.