01-03-2024 12:14 AM
Hi All and healthy new 2024 year!
Last week our external Qualys Scanner reported vulnerability classified as 316187 - Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service (cisco-sa-20180129-asa1) (level 5 criticality) was detected We had scan cisco-sa-20180129-asa1
Our version of ASAv is:
Cisco Adaptive Security Appliance Software Version 9.19(1)
SSP Operating System Version 2.13(0.198)
Device Manager Version 7.19(1)
Compiled on Mon 28-Nov-22 15:50 GMT by builders
System image file is "disk0:/asa9-19-1-smp-k8.bin"
I've done a research and didn't find someone mentioning ASA Virtual Appliances and this vulnerability.
I also didn't find our version listed as non-bug free
We are using it as remote access SSL VPN.
Any advice and comment will be great.
Thanks!
Solved! Go to Solution.
01-03-2024 12:49 AM
@BuHeTy the document below states this vulnerability has been fixed in versions prior to 9.9. Version 9.19 did not exist when this document was written in 2018 , which is why any version since 9.10 is not explictly referenced. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1
A general recommendation would be to use the ASA hardening guide to ensure your ASA is secure. https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/200150-Cisco-Guide-to-Harden-Cisco-ASA-Firewall.html#anc15
01-03-2024 11:23 AM
Your current release is not vulnerable to this as i had this before, your vulnerability Management is likely to be outdated.
01-03-2024 12:49 AM
@BuHeTy the document below states this vulnerability has been fixed in versions prior to 9.9. Version 9.19 did not exist when this document was written in 2018 , which is why any version since 9.10 is not explictly referenced. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1
A general recommendation would be to use the ASA hardening guide to ensure your ASA is secure. https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/200150-Cisco-Guide-to-Harden-Cisco-ASA-Firewall.html#anc15
01-03-2024 01:15 AM
Hi,
So could the scan result be considered as false positive?
Regarding hardening we have implemented most of these requirements.
01-03-2024 01:23 AM - edited 01-03-2024 02:06 AM
@BuHeTy I would say so as you are running one of the latest ASA versions. It depends on what the scanner was scanning for.
If you provide a sanitised copy of your config we can review and make suggestions for improvements.
01-03-2024 04:33 AM
I would consider this as a false positive. Is your Qualys up-to-date on its vulnerability database signatures?
01-04-2024 10:47 PM
Hi,
The Qualys scanner is not under our jurisdiction and belongs to an external company that does an audit.
I've written them but they don't reply, assume they don't care and we get level 5 criticality which they don't like
I've done Qualys scann on free tier account and got another results:
Which is TLS (DTLS) related ciph suite vuln, not the mentioned in their report.
01-03-2024 11:23 AM
Your current release is not vulnerable to this as i had this before, your vulnerability Management is likely to be outdated.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide