Sunday 22 February 2015

Hackers Now Popping Cisco VPN Portals


Cookies are displayed customize the Cisco virtual private networks, steal credentials and malware spraying with a defect reported by Aussie hacker, Alec Stuart-Muirk, the company that manages Cisco clientless SSL VPN portal warns.Organisations custom settings if no risk of attack are versions date published on 8 October.

Not the fault of the users of custom equipment are in trouble: Cisco says that the fault (CVE-2014-3393) appeared due to incorrect application of the authentication checks in the context of personalization. In detail: [Hole] could allow an unauthenticated remote attacker to modify the contents of the portal clientless SSL VPN, which could lead to several attacks, including the theft of credentials, cross-site scripting (XSS) and other types of attacks web on the client using the affected system.

When Cisco ASDM (Adaptive Security Device Manager) allows you to change the subject or customization back of a preview button is available for managers Cisco ASA allows you to see the changes. When using Cisco ASA preview will create a unique ID that is used as a session cookie and a folder in the system to include the contents of a permit customisation.Due defectively is selected, you can change anything remotely included in ramfs cache file system, including the customization of objects clientless SSL VPN.

Cisco says unauthenticated attackers could pull a series of attacks, including portal content change clientless SSL VPN, the injection of malware, stolen credentials and launch cross-site scripting. The company says that the load or change the Cisco ASA software will not eliminate the attacker details handiwork.Stuart-Muirk (PDF, slides) vulnerability patched then the hacker conspiracy Ruxcon in Melbourne last year.

Exploit script was added Metasploit.Compromised from the kit can be detected by the presence of embedded objects, scripts and iframes, Cisco says.Customers found an object customization efforts should follow the process of incident response, Cisco says.

No comments:

Post a Comment

Note: only a member of this blog may post a comment.