Article Details

Scrape Timestamp (UTC): 2024-12-03 12:53:23.829

Source: https://thehackernews.com/2024/12/cisco-warns-of-exploitation-of-decade.html

Original Article Text

Click to Toggle View

Cisco Warns of Exploitation of Decade-Old ASA WebVPN Vulnerability. Cisco on Monday updated an advisory to warn customers of active exploitation of a decade-old security flaw impacting its Adaptive Security Appliance (ASA). The vulnerability, tracked as CVE-2014-2120 (CVSS score: 4.3), concerns a case of insufficient input validation in ASA's WebVPN login page that could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a targeted user of the appliance. "An attacker could exploit this vulnerability by convincing a user to access a malicious link," Cisco noted in an alert released in March 2024. As of December 2, 2024, the networking equipment major has revised its bulletin to note that it has become aware of "additional attempted exploitation" of the vulnerability in the wild. The development comes shortly after cybersecurity firm CloudSEK revealed that the threat actors behind AndroxGh0st are leveraging an extensive list of security vulnerabilities in various internet-facing applications, including CVE-2014-2120, to propagate the malware. The malicious activity is also notable for the integration of the Mozi botnet, which allows the botnet to further expand in size and scope. As a result, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to its Known Exploited Vulnerabilities (KEV) catalog last month, requiring Federal Civilian Executive Branch (FCEB) agencies to remediate it by December 3, 2024. Users of Cisco ASA are highly recommended to keep their installations up-to-date for optimal protection and to safeguard against potential cyber threats.

Daily Brief Summary

CYBERCRIME // Cisco Alerts on Active Exploitation of Old WebVPN Flaw

Cisco has updated an advisory regarding active exploitation of the CVE-2014-2120 vulnerability in its Adaptive Security Appliance (ASA).

The vulnerability pertains to insufficient input validation on the ASA's WebVPN login page, which could lead to a cross-site scripting (XSS) attack.

Attackers could exploit this flaw by tricking users into accessing a malicious link.

Recent enhancements in the malicious use of this vulnerability are associated with the AndroxGh0st threat actors and propagation of the Mozi botnet.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the CVE-2014-2120 to its Known Exploited Vulnerabilities catalog, mandating remediation by specified federal agencies by December 3, 2024.

Cisco strongly recommends that ASA users update their systems to prevent exploitation and bolster cybersecurity defenses.