Critical Vulnerability in Cisco ASA

    The Cisco ASA operating system detected critical vulnerability CVE-2016-1287 in the implementation of the Internet Key Exchange (IKE) protocol version 1 and 2, which allows executing arbitrary code or remotely rebooting the device with a specially formed UDP packet. She has been assigned the highest level of danger.

    Technical overview and operational examples:
    blog.exodusintel.com/2016/02/10/firewall-hacking The

    following devices are susceptible to vulnerabilities:
    • Cisco ASA 5500 Series Adaptive Security Appliances
    • Cisco ASA 5500-X Series Next-Generation Firewalls
    • Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
    • Cisco ASA 1000V Cloud Firewall
    • Cisco Adaptive Security Virtual Appliance (ASAv)
    • Cisco Firepower 9300 ASA Security Module
    • Cisco ISA 3000 Industrial Security Appliance

    Corrected OS versions are already available:
    Basic versionCorrection
    7.29.1 (6.11)
    8.28.2 (5.59)
    8.39.1 (6.11)
    8.48.4 (7.30)
    8.5not affected
    8.69.1 (6.11)
    8.78.7 (1.18)
    9.09.0 (4.38)
    9.19.1 (6.11)
    9.29.2 (4.5)
    9.39.3 (3.7)
    9.49.4 (2.4)
    9.59.5 (2.2)

    On hardware with 256 MB of RAM, you can install version 8.2.5 (59) [ MEGA ].

    For most versions, the fix is ​​only available as an Interim version that is not visible when upgrading through ASDM. Download them manually from the download portal .
    And do not confuse the firmware file: for single-core 5500 it is just asaXXX-k8.bin, for multi-core 5500-X it will be like asaXXX-X- smp -k8.bin, and for FirePOWER it has another extension asaXXX-X- lfbff -k8. SPA .

    In version 9.1.7, they already found a bug related to SNMP, which can cause a cyclic reboot of some devices and now it is recommended to install 9.1 (6.11) to close the vulnerability. He and other problems are discussed in/ networking .

    Workaround


    As a workaround, TAC offers filtering packets for ports 500 and 4500:
    Here is an example of control plane ACL allowing access from 1.1.1.1 and denying everything else:
    access-list test permit udp host 1.1.1.1 any eq 500
    access-list test permit udp host 1.1.1.1 any eq 4500
    access-list test deny udp any any eq 500
    access-list test deny udp any any eq 4500
    access-list test permit ip any any
    access-group test in interface outside control-plane


    PS

    The keen eye of Sourg has noticed a paragraph for those whose contract has expired or is lost. Write to the TAC with a link to the newsletter and the serial number of the piece of iron:
    www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html

    PPS

    Inspired by the disinterestedness of Cisco, anonymus wanted to put the latest versions in free access, but noticed something strange in the user’s request and recalled the dependencies during the update without which you could lose the device, config, healthy sleep and hope for the future. And starting with version 8.3, the requirements for RAM have increased.

    If you are confident in your abilities and are not afraid of adventures: read the releases , backup and look for firmware on Rutreker, Rubord, Antitsisko and MegaSearch.

    Also popular now: