Attention Constituent:
#########################################
## S E C U R I T Y A D V I S O R Y ##
#########################################
Title : Cisco Router / Adaptive Security Appliance (ASA) and
FTD Software Vulnerability
Advisory ID : CIRT-BS-2023-0005
Version : 1.00
Probability : high
CVE ID : CVE-2023-20269
(http://cve.mitre.org/cve/)
Damage : high
Remote Code Execution
System Compromise
Publication date : 20231101
Product(s) : Cisco Adaptive Security Appliance (ASA) Clientless
SSL VPN
Cisco Firepower Threat Defense (FTD)
Version(s) : -6.2.3 – 9.19.1.18
-6.2.3 – 9.19.1.18
Platform(s) : Cisco Adaptive Security Appliance (ASA) Software –
Cisco Firepower Threat Defense –
Summary
This advisory addresses a VPN feature of Cisco Adaptive Security
Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD).
Consequences
Software vulnerability that allows unauthorized access. The
unauthenticated remote attacker can conduct a brute force attack in
an attempt to identify valid username and password combinations or
an authenticated remote attacker to establish a clientless SSL VPN
session with an unauthorized user.
Description
Although this vulnerability allows an unauthenticated remote
attacker to conduct a brute force attack, establishing a
client-based remote access VPN tunnel is not possible as these
default connection profiles/tunnel groups do not and cannot have an
IP address pool configured. This vulnerability does not allow an
attacker to bypass authentication.
Solution
To help customers determine their exposure to this vulnerability,
use the Cisco Software checker provided below or discontinue use of
the product.
https://sec.cloudapps.cisco.com/security/center/softwarechecker.x
Best,

|