<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Doubt about &amp;quot;Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability&amp;quot; in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/doubt-about-quot-cisco-adaptive-security-appliance-remote-code/m-p/3335289#M550093</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Could someone clarify the following question, please?&lt;/P&gt;
&lt;P&gt;Due to this Advisory ID cisco-sa-20180129-asa1, I upgraded from version 9.6(3)20 to version 9.6.4(3) as indicated.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;According to the information, the upgrade would fix the vulnerability.&amp;nbsp;So we could continue to use the Features without problems, right?&lt;/P&gt;
&lt;P&gt;In this case, I use AnyConnect IKEv2 Remote Access (with client services) and I need to continue using it.&lt;/P&gt;
&lt;P&gt;If I continue to use this feature, will I still be at risk?&lt;/P&gt;
&lt;P&gt;Are the SSL and DTLS listen sockets output above normal or should they be different after the upgrade?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--------------------------------------------&lt;BR /&gt;::: ASA device with SSL and DTLS listen sockets:&lt;/P&gt;
&lt;P&gt;asa# show asp table socket | include SSL|DTLS&lt;BR /&gt;SSL 00013b78 LISTEN 123.123.123.123:443 0.0.0.0:* &lt;BR /&gt;DTLS 000143e8 LISTEN &lt;SPAN&gt;123&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;123&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;123&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;123&lt;/SPAN&gt;:443 0.0.0.0:*&lt;BR /&gt;--------------------------------------------&lt;/P&gt;
&lt;P&gt;::: Feature:&lt;/P&gt;
&lt;P&gt;AnyConnect IKEv2 Remote Access (with client services)&lt;BR /&gt;--------------------------------------------&lt;/P&gt;
&lt;P&gt;::: Configuration:&lt;/P&gt;
&lt;P&gt;asa# show running-config crypto ikev2 | include enable&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;--------------------------------------------&lt;/P&gt;
&lt;P&gt;::: SSL system statistics&lt;/P&gt;
&lt;P&gt;asa# show asp table socket stats protocol ssl&lt;BR /&gt; &lt;BR /&gt;NP SSL System Stats:&lt;BR /&gt; Handshake Started: 1012&lt;BR /&gt; Handshake Complete: 890&lt;BR /&gt; SSL Open: 11&lt;BR /&gt; SSL Close: 1703&lt;BR /&gt; SSL Server: 1066&lt;BR /&gt; SSL Server Verify: 0&lt;BR /&gt; SSL Client: 0&lt;BR /&gt;--------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;Att,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Flavio&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 18:46:19 GMT</pubDate>
    <dc:creator>flleandro</dc:creator>
    <dc:date>2020-02-21T18:46:19Z</dc:date>
    <item>
      <title>Doubt about "Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability"</title>
      <link>https://community.cisco.com/t5/network-access-control/doubt-about-quot-cisco-adaptive-security-appliance-remote-code/m-p/3335289#M550093</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Could someone clarify the following question, please?&lt;/P&gt;
&lt;P&gt;Due to this Advisory ID cisco-sa-20180129-asa1, I upgraded from version 9.6(3)20 to version 9.6.4(3) as indicated.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;According to the information, the upgrade would fix the vulnerability.&amp;nbsp;So we could continue to use the Features without problems, right?&lt;/P&gt;
&lt;P&gt;In this case, I use AnyConnect IKEv2 Remote Access (with client services) and I need to continue using it.&lt;/P&gt;
&lt;P&gt;If I continue to use this feature, will I still be at risk?&lt;/P&gt;
&lt;P&gt;Are the SSL and DTLS listen sockets output above normal or should they be different after the upgrade?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--------------------------------------------&lt;BR /&gt;::: ASA device with SSL and DTLS listen sockets:&lt;/P&gt;
&lt;P&gt;asa# show asp table socket | include SSL|DTLS&lt;BR /&gt;SSL 00013b78 LISTEN 123.123.123.123:443 0.0.0.0:* &lt;BR /&gt;DTLS 000143e8 LISTEN &lt;SPAN&gt;123&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;123&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;123&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;123&lt;/SPAN&gt;:443 0.0.0.0:*&lt;BR /&gt;--------------------------------------------&lt;/P&gt;
&lt;P&gt;::: Feature:&lt;/P&gt;
&lt;P&gt;AnyConnect IKEv2 Remote Access (with client services)&lt;BR /&gt;--------------------------------------------&lt;/P&gt;
&lt;P&gt;::: Configuration:&lt;/P&gt;
&lt;P&gt;asa# show running-config crypto ikev2 | include enable&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;--------------------------------------------&lt;/P&gt;
&lt;P&gt;::: SSL system statistics&lt;/P&gt;
&lt;P&gt;asa# show asp table socket stats protocol ssl&lt;BR /&gt; &lt;BR /&gt;NP SSL System Stats:&lt;BR /&gt; Handshake Started: 1012&lt;BR /&gt; Handshake Complete: 890&lt;BR /&gt; SSL Open: 11&lt;BR /&gt; SSL Close: 1703&lt;BR /&gt; SSL Server: 1066&lt;BR /&gt; SSL Server Verify: 0&lt;BR /&gt; SSL Client: 0&lt;BR /&gt;--------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;Att,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Flavio&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:46:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/doubt-about-quot-cisco-adaptive-security-appliance-remote-code/m-p/3335289#M550093</guid>
      <dc:creator>flleandro</dc:creator>
      <dc:date>2020-02-21T18:46:19Z</dc:date>
    </item>
    <item>
      <title>Re: Doubt about "Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability"</title>
      <link>https://community.cisco.com/t5/network-access-control/doubt-about-quot-cisco-adaptive-security-appliance-remote-code/m-p/3335295#M550096</link>
      <description>&lt;P&gt;You are correct, if you are using the updated code from Cisco the vulnerability has been patched and you can continue on using the VPN features of the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I noticed the SSL/DTLS commands outputs didn't change any after the update which they shouldn't. The new code wouldn't have modified your config it would have just patched the security hole that existed&amp;nbsp;for those processes.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 17:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/doubt-about-quot-cisco-adaptive-security-appliance-remote-code/m-p/3335295#M550096</guid>
      <dc:creator>Ben Walters</dc:creator>
      <dc:date>2018-02-21T17:17:31Z</dc:date>
    </item>
  </channel>
</rss>

