<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Potential CSRF attack dtected - ANYCONNECT, SSL WEBVPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4868701#M1102355</link>
    <description>&lt;P&gt;Hi&lt;BR /&gt;I know this is an old post, but for anyone who still have this issue, here is what I did. After confirming all my URLs were correct, I resolved the issue by removing the default value of 300ms in Request Timeout, under Single Sign-On server profile. Removing the 300ms, sets Timeout to "Use the timeout set by the Provider". Everything works great now. You can read more about it under "SAML Timeout section" here &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/asdm716/vpn/asdm-716-vpn-config/webvpn-configure-users.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/asdm716/vpn/asdm-716-vpn-config/webvpn-configure-users.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 06 Jul 2023 08:08:13 GMT</pubDate>
    <dc:creator>JohnKimble</dc:creator>
    <dc:date>2023-07-06T08:08:13Z</dc:date>
    <item>
      <title>Potential CSRF attack dtected - ANYCONNECT, SSL WEBVPN</title>
      <link>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4270070#M1077164</link>
      <description>&lt;P&gt;Gentlemen need you help.&lt;/P&gt;&lt;P&gt;We can successfully connect with anyconnect to asa.&amp;nbsp;&lt;/P&gt;&lt;P&gt;However when we implement SAML Authentication (DUO 2 Factor authentication) We cannot connect with the error&amp;nbsp;&lt;/P&gt;&lt;P&gt;Potential CSRF attack dtected.&lt;/P&gt;&lt;P&gt;We can see this is a cross site scripting issue, and&amp;nbsp;The ASA&amp;nbsp; is providing CSRF protection and causing this error.&lt;BR /&gt;The error we see&amp;nbsp; is being generated by the ASA.&lt;/P&gt;&lt;P&gt;Can you help me how to disable that protection or at least pisibility to whitelist interested hosts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here a short info&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.15(1)1&lt;BR /&gt;SSP Operating System Version 2.9(1.131)&lt;BR /&gt;Device Manager Version 7.15(1)&lt;/P&gt;&lt;P&gt;Compiled on Fri 20-Nov-20 18:59 GMT by builders&lt;BR /&gt;System image file is "disk0:/asa9-15-1-1-smp-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hardware: ASA5525, 8192 MB RAM, CPU Lynnfield 2400 MHz, 1 CPU (4 cores)&lt;BR /&gt;ASA: 4104 MB RAM, 1 CPU (1 core)&lt;BR /&gt;Internal ATA Compact Flash, 8192MB&lt;BR /&gt;BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1 )&lt;BR /&gt;Boot microcode : CNPx-MC-BOOT-2.00&lt;BR /&gt;SSL/IKE microcode : CNPx-MC-SSL-SB-PLUS-0005&lt;BR /&gt;IPSec microcode&lt;BR /&gt;The Running Activation Key feature: 10000 AnyConnect Premium sessions exceed the limit on the platform, reduced to 750 AnyConnect Premium sessions.&lt;BR /&gt;The Running Activation Key feature: 10000 TLS Proxy sessions exceed the limit on the platform, reduced to 1000 TLS Proxy sessions.&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 200 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Active perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Security Contexts : 20 perpetual&lt;BR /&gt;Carrier : Enabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 750 perpetual&lt;BR /&gt;AnyConnect Essentials : 750 perpetual&lt;BR /&gt;Other VPN Peers : 750 perpetual&lt;BR /&gt;Total VPN Peers : 750 perpetual&lt;BR /&gt;AnyConnect for Mobile : Enabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Enabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Enabled perpetual&lt;BR /&gt;Shared License : Enabled perpetual&lt;BR /&gt;Total TLS Proxy Sessions : 1000 perpetual&lt;BR /&gt;Botnet Traffic Filter : Enabled perpetual&lt;BR /&gt;IPS Module : Disabled perpetual&lt;BR /&gt;Cluster : Enabled perpetual&lt;BR /&gt;Cluster Members : 4 perpetual&lt;/P&gt;&lt;P&gt;This platform has an ASA5525 VPN Premium license.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Failover cluster licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 200 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Active perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Security Contexts : 20 perpetual&lt;BR /&gt;Carrier : Enabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 750 perpetual&lt;BR /&gt;AnyConnect Essentials : 750 perpetual&lt;BR /&gt;Other VPN Peers : 750 perpetual&lt;BR /&gt;Total VPN Peers : 750 perpetual&lt;BR /&gt;AnyConnect for Mobile : Enabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Enabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Enabled perpetual&lt;BR /&gt;Shared License : Enabled perpetual&lt;BR /&gt;Total TLS Proxy Sessions : 1000 perpetual&lt;BR /&gt;Botnet Traffic Filter : Enabled perpetual&lt;BR /&gt;IPS Module : Disabled perpetual&lt;BR /&gt;Cluster : Enabled perpetual&lt;/P&gt;&lt;P&gt;This platform has an ASA5525 VPN Premium license.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;webvpn config&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp;port 4443&lt;/P&gt;&lt;P&gt;&amp;nbsp;enable outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;dtls port 4443&lt;/P&gt;&lt;P&gt;&amp;nbsp;http-headers&lt;/P&gt;&lt;P&gt;&amp;nbsp;hsts-server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;max-age 31536000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;include-sub-domains&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;no preload&lt;/P&gt;&lt;P&gt;&amp;nbsp;hsts-client&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;x-content-type-options&lt;/P&gt;&lt;P&gt;&amp;nbsp;x-xss-protection&lt;/P&gt;&lt;P&gt;&amp;nbsp;content-security-policy default-src 'self'&amp;nbsp;&lt;A href="https://api-b0affc49.duosecurity.com&amp;nbsp;'unsafe-inline" target="_blank" rel="noopener"&gt;https://api-b0affc49.duosecurity.com&amp;nbsp;'unsafe-inline&lt;/A&gt;' 'unsafe-eval' data: blob:; frame-ancestors 'self'&lt;/P&gt;&lt;P&gt;&amp;nbsp;no anyconnect-essentials&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 12:42:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4270070#M1077164</guid>
      <dc:creator>pchelisant</dc:creator>
      <dc:date>2021-01-11T12:42:58Z</dc:date>
    </item>
    <item>
      <title>Re: Potential CSRF attack dtected - ANYCONNECT, SSL WEBVPN</title>
      <link>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4270079#M1077165</link>
      <description>&lt;P&gt;Look at the below suggetions :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj34599" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj34599&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://duo.com/docs/ciscoasa-sso" target="_blank"&gt;https://duo.com/docs/ciscoasa-sso&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 12:57:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4270079#M1077165</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-01-11T12:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: Potential CSRF attack dtected - ANYCONNECT, SSL WEBVPN</title>
      <link>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4270284#M1077166</link>
      <description>&lt;P&gt;Sorry first link doesnt work for me.&lt;/P&gt;&lt;P&gt;Tried to whitelist useragent however no success.&lt;/P&gt;&lt;P&gt;Other 2 links a well known to me, and as per config you can see i use the latest software version&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 17:37:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4270284#M1077166</guid>
      <dc:creator>pchelisant</dc:creator>
      <dc:date>2021-01-11T17:37:05Z</dc:date>
    </item>
    <item>
      <title>Re: Potential CSRF attack dtected - ANYCONNECT, SSL WEBVPN</title>
      <link>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4270371#M1077167</link>
      <description>&lt;P&gt;first, link was a bug - older version since you running the same kind of issue so suggested to have look.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 20:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4270371#M1077167</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-01-11T20:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Potential CSRF attack dtected - ANYCONNECT, SSL WEBVPN</title>
      <link>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4300466#M1078943</link>
      <description>&lt;P&gt;anybody figured out the issue?&lt;/P&gt;&lt;P&gt;getting the same error with okta. running latest 6.7 ftd&lt;/P&gt;</description>
      <pubDate>Wed, 03 Mar 2021 04:42:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4300466#M1078943</guid>
      <dc:creator>loizosko</dc:creator>
      <dc:date>2021-03-03T04:42:15Z</dc:date>
    </item>
    <item>
      <title>Re: Potential CSRF attack dtected - ANYCONNECT, SSL WEBVPN</title>
      <link>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4439799#M1082514</link>
      <description>&lt;P&gt;what was the resolution for this case?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 18:18:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4439799#M1082514</guid>
      <dc:creator>IvanAlvarenga25979</dc:creator>
      <dc:date>2021-07-27T18:18:04Z</dc:date>
    </item>
    <item>
      <title>Re: Potential CSRF attack dtected - ANYCONNECT, SSL WEBVPN</title>
      <link>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4439806#M1082515</link>
      <description>&lt;P&gt;there was a timer in the firewall idp settings that did not match the timer in the sso provider settings.&lt;/P&gt;&lt;P&gt;after making it the same it worked&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 18:35:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4439806#M1082515</guid>
      <dc:creator>loizosko</dc:creator>
      <dc:date>2021-07-27T18:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: Potential CSRF attack dtected - ANYCONNECT, SSL WEBVPN</title>
      <link>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4455562#M1083172</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/254424"&gt;@loizosko&lt;/a&gt;, I'm facing the same issue with the FTD 6.7, what timer do you talking about please?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Aug 2021 19:15:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4455562#M1083172</guid>
      <dc:creator>atocki</dc:creator>
      <dc:date>2021-08-26T19:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: Potential CSRF attack dtected - ANYCONNECT, SSL WEBVPN</title>
      <link>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4868701#M1102355</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;I know this is an old post, but for anyone who still have this issue, here is what I did. After confirming all my URLs were correct, I resolved the issue by removing the default value of 300ms in Request Timeout, under Single Sign-On server profile. Removing the 300ms, sets Timeout to "Use the timeout set by the Provider". Everything works great now. You can read more about it under "SAML Timeout section" here &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/asdm716/vpn/asdm-716-vpn-config/webvpn-configure-users.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/asdm716/vpn/asdm-716-vpn-config/webvpn-configure-users.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jul 2023 08:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/potential-csrf-attack-dtected-anyconnect-ssl-webvpn/m-p/4868701#M1102355</guid>
      <dc:creator>JohnKimble</dc:creator>
      <dc:date>2023-07-06T08:08:13Z</dc:date>
    </item>
  </channel>
</rss>

