May 2020 Cisco Remote Vulnerabilities Guidance

May 2020 Cisco Remote Vulnerabilities Guidance

Cisco has noted a whopping 34 vulnerabilities across two of its remote access and network inspection devices on May 6, 2020. While it is important to patch all of them, there are a dozen that require your immediate attention, with an especially concerning duo of vulnerabilities that we’ll cover first:


CVE-2020-3187: An unauthenticated, remotely exploitable path traversal in the web services interface of Cisco Adaptive Security Appliance Software (ASA) and Cisco Firepower Threat Defense (FTD).
CVE-2020-3529: Another unauthenticated, remotely exploitable vulnerability in both ASA and FTD that can be used to retrieve the contents of the device active memory.

The vast majority of the 12 more urgent vulnerabilities will result in a denial-of-service (DoS) condition on these devices. Given the recent significant increase in the percentage of remote workers in most organizations, it is inadvisable to postpone patching DoS weaknesses as you may have in the past. What previously may have been a minor, temporary disruption may now turn into a significant interruption in service and, even worse for their paired disclosure weaknesses, a breach of confidentiality.


Overview of the two major Cisco vulnerabilities


Cisco claims the weaknesses associated with CVE-2020-3187 only enable attackers to traverse the web application side of ASA and FTD devices, where they are then able to read or delete files. The latter action can lead to a denial-of-service condition, but a reboot will replace any deleted files. The former can enable attackers to retrieve sensitive device- and organization-specific secrets that may enable them to perform ad ..

Support the originator by clicking the read the rest link below.