<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA vulnerable in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-vulnerable/m-p/5081820#M1111805</link>
    <description>&lt;P&gt;There really is not much you can do with that hardware.&amp;nbsp; The last supported version for ASA5505 is 7.0.4.&amp;nbsp; To protect yourself against the recent vulnerabilities you would need to upgrade your hardware and then install the latest fixed version of ASA or FTD (depending on which you go for.)&lt;/P&gt;</description>
    <pubDate>Mon, 29 Apr 2024 09:11:27 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2024-04-29T09:11:27Z</dc:date>
    <item>
      <title>Cisco ASA vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vulnerable/m-p/5081115#M1111761</link>
      <description>&lt;P&gt;Hi, im running a Cisco ASA 5505 with 9.1(2) with Anyconnect enabled. I read that there are some vulnerabilities on this device. Am i affected or any recommendations on what i should do?&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 14:58:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vulnerable/m-p/5081115#M1111761</guid>
      <dc:creator>Cisco SE</dc:creator>
      <dc:date>2024-04-28T14:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vulnerable/m-p/5081118#M1111763</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;check this&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 15:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vulnerable/m-p/5081118#M1111763</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-28T15:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vulnerable/m-p/5081471#M1111788</link>
      <description>&lt;P&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_attacks_event_response" target="_self"&gt;Cisco Event Response: Attacks Against Cisco Firewall Platforms&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;1.&amp;nbsp;&amp;nbsp;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2" target="_self"&gt;Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;2.&amp;nbsp;&amp;nbsp;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h" target="_self"&gt;Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;#1 &amp;amp; #2 are currently being actively exploited in the wild.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;DIV class="hbuttonelement"&gt;&lt;STRONG&gt;Exploitation and Public Announcements&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;DIV id="exploitfield" class="ud-innercontent-area"&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.&lt;/P&gt;
&lt;/DIV&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;Further reading:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.cisa.gov/news-events/alerts/2024/04/24/cisa-adds-three-known-exploited-vulnerabilities-catalog" target="_self"&gt;&lt;SPAN&gt;CISA Adds Three Known Exploited Vulnerabilities to Catalog&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/" target="_self"&gt;ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 29 Apr 2024 01:19:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vulnerable/m-p/5081471#M1111788</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2024-04-29T01:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vulnerable/m-p/5081820#M1111805</link>
      <description>&lt;P&gt;There really is not much you can do with that hardware.&amp;nbsp; The last supported version for ASA5505 is 7.0.4.&amp;nbsp; To protect yourself against the recent vulnerabilities you would need to upgrade your hardware and then install the latest fixed version of ASA or FTD (depending on which you go for.)&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 09:11:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vulnerable/m-p/5081820#M1111805</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-29T09:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vulnerable/m-p/5087397#M1112012</link>
      <description>&lt;P&gt;Seriously ?&lt;/P&gt;&lt;P&gt;There is so much CVE issue applicable to such an old ASA version ! It is a crazy situation.&lt;/P&gt;&lt;P&gt;I don't know what you expect to protect with that but if it is exposed to Internet, I guess it might be already compromised. As &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt; said, just upgrade to a supported hardware and a supported code.&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 09:28:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vulnerable/m-p/5087397#M1112012</guid>
      <dc:creator>Jerome BERTHIER</dc:creator>
      <dc:date>2024-05-02T09:28:21Z</dc:date>
    </item>
  </channel>
</rss>

