<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AnyConnect - Brute Force Attempts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-brute-force-attempts/m-p/4931713#M1104712</link>
    <description>&lt;P&gt;DfltGrpPolicy is attached to tunnel-groups DefaultWEBVPNGroup and DefaultRAGroup by default. The DefaultWEBVPNGroup can accept AnyConnections too, not just clientless requests from a browser. And actually, even if you configure "vpn-simultaneous-logins 0" or "vpn-tunnel-protocol ikev1" in the DfltGrpPolicy this doesn't stop password guessing attacks due to the nature of the vulnerability. This only blocks connection attempts *after* login/password prompt, if correct username and password were submitted by the attacker. To stop the password guessing attack (or at least make it more difficult) you need to use cert+aaa authentication, so that attacker needs to provide valid certificate first before password prompt appears. Also, it's recommended not to use default tunnel-groups (if possible, which depends on many factors) and block AAA in them completely with "authentication certificate" in webvpn-attributes.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Sep 2023 17:25:27 GMT</pubDate>
    <dc:creator>tvotna</dc:creator>
    <dc:date>2023-09-29T17:25:27Z</dc:date>
    <item>
      <title>AnyConnect - Brute Force Attempts</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-brute-force-attempts/m-p/4931002#M1104655</link>
      <description>&lt;P&gt;Firepower 2110 managed by FMC - Device is only used as a VPN device and has AnyConnectPlus licensing only.&lt;BR /&gt;&lt;BR /&gt;Since the announcement of the CVE related to AnyConnect I have been monitoring logs, and using FlexConfig to block traffic from IP blocks when I saw attempts come in. This morning logs show a new methodology where they are using a VPN tool, or botnet to make 3-4 login attempts then switch source IPs and try again, this makes IP blocking impossible to implement. All of these attempts are showing as coming from WebVPN.&lt;BR /&gt;&lt;BR /&gt;I have added a FlexConfig to Disable WebVPN (&lt;SPAN&gt;webvpn &lt;/SPAN&gt;&lt;SPAN&gt;portal-access-rule&amp;nbsp;1&amp;nbsp;deny&amp;nbsp;any&lt;/SPAN&gt;) and I get a "forbidden" message if I try to access the WebVPN UI via web browser&lt;/P&gt;&lt;P&gt;However, I still see the below rejected authentication messages showing up in logs.&lt;BR /&gt;Group &amp;lt;DfltGrpPolicy&amp;gt; User &amp;lt;*****&amp;gt; IP &amp;lt;107.144.237.108&amp;gt; Authentication: rejected, Session Type: WebVPN.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Am I missing something to completely close down WebVPN as an attack vector since I am still seeing these attempts in logs? Or is the rule working properly and rejecting all logins attempted through WebVPN, but not preventing the attempts entirely based on a limitation of how the rule functions?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 15:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-brute-force-attempts/m-p/4931002#M1104655</guid>
      <dc:creator>JRHTC</dc:creator>
      <dc:date>2023-09-28T15:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect - Brute Force Attempts</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-brute-force-attempts/m-p/4931116#M1104662</link>
      <description>&lt;P&gt;Update: It looks like the attempts have stopped, or are now being fully blocked. and are no longer showing up in the logs. Stopped about 10 minutes after I pushed the config update.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 17:02:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-brute-force-attempts/m-p/4931116#M1104662</guid>
      <dc:creator>JRHTC</dc:creator>
      <dc:date>2023-09-28T17:02:51Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect - Brute Force Attempts</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-brute-force-attempts/m-p/4931713#M1104712</link>
      <description>&lt;P&gt;DfltGrpPolicy is attached to tunnel-groups DefaultWEBVPNGroup and DefaultRAGroup by default. The DefaultWEBVPNGroup can accept AnyConnections too, not just clientless requests from a browser. And actually, even if you configure "vpn-simultaneous-logins 0" or "vpn-tunnel-protocol ikev1" in the DfltGrpPolicy this doesn't stop password guessing attacks due to the nature of the vulnerability. This only blocks connection attempts *after* login/password prompt, if correct username and password were submitted by the attacker. To stop the password guessing attack (or at least make it more difficult) you need to use cert+aaa authentication, so that attacker needs to provide valid certificate first before password prompt appears. Also, it's recommended not to use default tunnel-groups (if possible, which depends on many factors) and block AAA in them completely with "authentication certificate" in webvpn-attributes.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2023 17:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-brute-force-attempts/m-p/4931713#M1104712</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-09-29T17:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect - Brute Force Attempts</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-brute-force-attempts/m-p/4947051#M1105343</link>
      <description>&lt;P&gt;I see the same thing on my ASA. We are not using the default connection profiles, so if I change the auth on them to certificate only, that would prevent the password guessing? Other than default our only tunnel group uses SAML to enforce MFA.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 17:11:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-brute-force-attempts/m-p/4947051#M1105343</guid>
      <dc:creator>sysad43</dc:creator>
      <dc:date>2023-10-24T17:11:34Z</dc:date>
    </item>
  </channel>
</rss>

