<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2018-0101 – Cisco ASA Remote Code in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/3769256#M8155</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; I have found the CVE-2018-0101 vulnerability recently.Our ASA(5515) had enable the webvpn.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the show version output:&lt;/P&gt;&lt;P&gt;ASA5515# sho version | in Version&lt;BR /&gt;Cisco Adaptive Security Appliance Software Version 9.2(2)4&lt;BR /&gt;Device Manager Version 7.2(2)1&lt;BR /&gt;Baseboard Management Controller (revision 0x1) Firmware Version: 2.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Had the&amp;nbsp;&lt;SPAN&gt;Version 9.2(2)4 affected by&amp;nbsp;CVE-2018-0101 vulnerability&amp;nbsp;?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:36:45 GMT</pubDate>
    <dc:creator>tianwen.zhao</dc:creator>
    <dc:date>2020-02-21T16:36:45Z</dc:date>
    <item>
      <title>CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/3769256#M8155</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; I have found the CVE-2018-0101 vulnerability recently.Our ASA(5515) had enable the webvpn.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the show version output:&lt;/P&gt;&lt;P&gt;ASA5515# sho version | in Version&lt;BR /&gt;Cisco Adaptive Security Appliance Software Version 9.2(2)4&lt;BR /&gt;Device Manager Version 7.2(2)1&lt;BR /&gt;Baseboard Management Controller (revision 0x1) Firmware Version: 2.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Had the&amp;nbsp;&lt;SPAN&gt;Version 9.2(2)4 affected by&amp;nbsp;CVE-2018-0101 vulnerability&amp;nbsp;?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:36:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/3769256#M8155</guid>
      <dc:creator>tianwen.zhao</dc:creator>
      <dc:date>2020-02-21T16:36:45Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/3769278#M8156</link>
      <description>&lt;P&gt;Yes your ASA software is affected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please refer to the actual Cisco Security Advisory for confirmation and details on the fixed releases:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Dec 2018 03:03:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/3769278#M8156</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-12-27T03:03:21Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/3769280#M8157</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Yes, 9.2(2)4 is affected. You need to be running at least 9.2(4)27. The following link gives you versions that have the fix:&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Dec 2018 03:04:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/3769280#M8157</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2018-12-27T03:04:46Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/3769704#M8158</link>
      <description>Thank you</description>
      <pubDate>Fri, 28 Dec 2018 00:32:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/3769704#M8158</guid>
      <dc:creator>tianwen.zhao</dc:creator>
      <dc:date>2018-12-28T00:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4320527#M1079940</link>
      <description>&lt;P&gt;I know this is old thread here but I am getting flagged on PCI compliance scan for this vulnerability on ASA 9.15(1). WTH is up with this , I don't have a smartnet associated with the serial number for this ASA so I cannot open a TAC on it. This is pretty lousy to still have this come up in a scan with latest cisco release for this ASA. The only way forwatrd it looks like is to disable the webvpn since I cannot download&amp;nbsp; patch (If there even is one) Do you have any thoughts on this one Marvin&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE-2018-0101&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Apr 2021 13:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4320527#M1079940</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2021-04-08T13:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4320768#M1079946</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;are you running webvpn/anyconnect VPN on the ASA?&lt;/P&gt;&lt;P&gt;if not, just simple disable it (or remove its config).&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ciscoasa(config)# webvpn&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ciscoasa(config-webvpn)# no enable outside&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 01:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4320768#M1079946</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2021-04-09T01:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4320943#M1079960</link>
      <description>&lt;P&gt;Hey John thanks for the reply. We are using Webvpn where employees can download the anyconnect vpn client. They do use the anyconnect client to establish the VPN. I though about this same thing in removing webvpn but would it also effect the anyconnect client? I get confused on the anyconnect client I believe it also negotiates over SSL 443. If this is accurate then I'm in a bit of a conundrum in that trying to patch per this vulnerability I'd be disabling vpn access. I also read this vulnerability has been fixed in much earlier releases then the ASA code on running which is 9.15.1. I don't understand how I'm going to resolve and still keep the vpn&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 11:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4320943#M1079960</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2021-04-09T11:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4321122#M1079980</link>
      <description>&lt;P&gt;i'm thinking of changing the&amp;nbsp; anyconnect listener port to 444 which would I believe would also disable dtls. I think this should work to remediate this&amp;nbsp;&lt;SPAN&gt;CVE-2018-0101 "supposed" vulnerability&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 16:49:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4321122#M1079980</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2021-04-09T16:49:16Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4321134#M1079982</link>
      <description>&lt;P&gt;I am surprised to see this show up in 9.15(1) which initially came out just 6 months ago.&lt;/P&gt;
&lt;P&gt;You can change the client services (and I believe even DTLS) to use something other than port 443; however that might just make the vulnerability not-so-easily detected by a scan while still being present.&lt;/P&gt;
&lt;P&gt;The release notes for 9.15(1) interim builds don't mention it but have your tried the latest interim build 10?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/web/software/280775065/155601/ASA-9151-Interim-Release-Notes.html" target="_blank"&gt;https://www.cisco.com/web/software/280775065/155601/ASA-9151-Interim-Release-Notes.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 17:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4321134#M1079982</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-04-09T17:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4321168#M1079984</link>
      <description>&lt;P&gt;Thanks Marvin I don't see the 10 interim build as being available to download. All I see is the version I am running 9.15.1&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 18:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4321168#M1079984</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2021-04-09T18:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4390784#M1080194</link>
      <description>&lt;P&gt;Thanks Marvin I appreciate your response. Its a scan issue not an actual vulnerability. Pretty irritating as now I will have to fight the compliance scanning company to pass this firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Keith,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate your patience and cooperation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked regarding the information, and it is evident that the issue is already fixed in the earlier versions of ASA, since the actual issue was with the XML parser of the Cisco ASA device with allocating and freeing memory when processing a malicious XML payload. The XML parser issue is already fixed in the earlier versions, and hence your device is not vulnerable as per the security bulletin.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding the scan results, it detects this vulnerability on your device just because of the configuration related to web vpn and the sockets that are open, however the actual issue was related to the XML parser which is resolved in the earlier version as mentioned in the Security bulletin, and hence your version is not vulnerable to this CVE-ID.&lt;/P&gt;&lt;P&gt;This scan results could be a false alarm, and is only arising due the config present on your device.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Apr 2021 13:41:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4390784#M1080194</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2021-04-21T13:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4390943#M1080203</link>
      <description>&lt;P&gt;That's a pretty weak answer from the company doing the scanning. Basically they seem to be saying the tool just does a first level pass and they don't have a human audit the results for accuracy unless you complain about it!&lt;/P&gt;</description>
      <pubDate>Wed, 21 Apr 2021 17:44:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4390943#M1080203</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-04-21T17:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2018-0101 – Cisco ASA Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4422011#M1081707</link>
      <description>&lt;P&gt;I ended up just changing ports to 444 which the scan passed. Could not get in contact with anyone at scanning company(Typical)&amp;nbsp; Just figured i'd let ya know sorry just never got back here.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 17:40:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2018-0101-cisco-asa-remote-code/m-p/4422011#M1081707</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2021-06-22T17:40:29Z</dc:date>
    </item>
  </channel>
</rss>

