Your IT Support Experts - Homepage

We partner with many types of businesses in the area, and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. Our dedicated staff loves seeing our clients succeed. Your success is our success, and as you grow, we grow.

Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

(703) 359-9211

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

Macro Systems Blog

Macro Systems has been serving the Metro Washington, DC area since 1997, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Numerous Patches Required for Cisco's Vulnerability

Numerous Patches Required for Cisco's Vulnerability

Virtual private networks are susceptible to an exploit that was recently revealed. Cisco has declared that this exploit undermines its Adaptive Security Appliance (ASA) tool. If this issue isn’t patched instantly, you could find your business vulnerable via remote code exploitation.

This VPN bug can force the ASA operating system to allow hackers to breach Cisco security devices. According to Cisco, this Secure Sockets Layer (SSL) can “allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.” This means that a cybercriminal could hypothetically gain complete access to a system and control it, a prospect that any organization should see the threat in. In fact, this vulnerability has been ranked as a 10 out of 10 on the Common Vulnerability Score System.

This vulnerability only occurs if WebVPN has been enabled, but that doesn’t mean that you can afford to not take this threat seriously. ZDNet supplies the following list of affected devices:

  • 3000 Series Industrial Security Appliance (ISA)
  • ASA 5500 Series Adaptive Security Appliances
  • ASA 5500-X Series Next-Generation Firewalls
  • ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
  • ASA 1000V Cloud Firewall
  • Adaptive Security Virtual Appliance (ASAv)
  • Firepower 2100 Series Security Appliance
  • Firepower 4110 Security Appliance
  • Firepower 9300 ASA Security Module
  • Firepower Threat Defense Software (FTD).

When it was initially discovered, this bug had yet to be utilized “in the wild,” but Cisco was aware of some attempts to change that. This exploit targeted a bug from seven years ago, with a proof of concept demonstrating the use of the exploit, or at least trying to. The proof of concept only resulted in a system crash, but that doesn’t alter the fact that this vulnerability can be exploited in other ways, too.

Sadly, this vulnerability has now been observed in use, and worse, Cisco’s initial attempt to patch it didn’t see to all related variables. As it turned out, there were more attack vectors and features that were not yet identified, and so they were not addressed by the patch.

Nevertheless, Cisco has now released an upgraded patch, which you need to implement as soon as possible. If you don't, you are opening up your business security to far greater risk. It is always a better practice to attend to known vulnerabilities ASAP, as the longer your business is vulnerable, the more likely it is that someone will take advantage of that.

Moreover, it is also critical that you stay aware of all vulnerabilities that are present in your mission-critical software and hardware solutions. This bug is not an isolated incident. Others like it have been found before, and more will certainly appear in the future. Hackers and cybercriminals are constantly working to overcome the security features that software developers implement. It is your responsibility to ensure that you protect your business by implementing security patches and updates promptly.

Macro Systems can help you with that. We can help you ensure that your patches and updates are as current as possible, often without needing to take the time needed for an on-site visit and handling it all remotely. For more information, give us a call at 703-359-9211.

How to Identify a Phishing Attack
5 Most Popular Browsers - Which Are the Most Secur...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Saturday, April 20, 2024

Captcha Image

Customer Login


Contact Us

Learn more about what Macro Systems can do for your business.

(703) 359-9211

Macro Systems
3867 Plaza Drive
Fairfax, Virginia 22030