Privilege Escalation Flaw in Cisco ASA Allows Attackers To Read or Write Files in the System

A Privilege Escalation vulnerability discovered in Cisco ASA allows an lowest privilege user to overwrite the system’s firmware, full configuration file, and to create new users.

The vulnerability was identified by Tenable, tracked as CVE-2018-15465, allows a remote attacker to perform privileged actions in the web interface.

To exploit this vulnerability the attacker “requires the HTTP interface for IOS to be enabled, and the “aaa” authentication scheme needs to be set, which is not part of the ASAv default configuration.”

The vulnerability is due to the improper validation of user management in the webmanagement, an attacker could exploit this vulnerability by sending a crafted HTTP requests through HTTPS to the affected as an unprivileged user.

An attacker could exploit the vulnerability to retrive files from the device or to upload and replace software images on the device.

The vulnerability affects all the Cisco ASA Software running with web management access enabled.

Now Cisco has released an advisory and patches, enabling command authorization prevents the exploitation of this vulnerability.

Cisco recommends “Administrators who use the Adaptive Security Device Manager (ASDM) to manage the ASA are advised to enable command authorization by using the ASDM because doing so will allow the ASDM to push predefined command sets for different privilege to the ASA.”

Related Read

Cisco Releases Security Updates that Covers 16 Vulnerabilities that had Critical and High Impact

Cisco Released Security Updates for Multiple Vulnerabilities that Affected Cisco Products

Cisco Released Critical Security Updates for Vulnerabilities that Affected Cisco Products

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000 malicious…

10 minutes ago

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in Taiwan…

50 minutes ago

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords

A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large language…

1 hour ago

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been…

12 hours ago

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government, defense,…

12 hours ago

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of…

12 hours ago