Photo credit: www.darkreading.com
Cisco Alerts Customers to Ongoing Security Threat for ASA
Cisco has issued a warning regarding a significant security vulnerability within its Adaptive Security Appliance (ASA), which is reportedly being actively exploited by malicious actors.
The vulnerability, identified as CVE-2014-2120, has existed for nearly a decade. It stems from inadequate input validation on the WebVPN login page of ASA, allowing an unauthenticated attacker to perform a cross-site scripting (XSS) attack.
In its findings from 2014, Cisco stated that this vulnerability arises from “insufficient input validation of a parameter,” noting that the risk comes from convincing users to click on harmful links.
Recently, Cisco reported that it became aware of attempts to exploit this vulnerability in the wild as of November 2024. The company has urged its clients to upgrade to the latest software version to protect against this security flaw, as no effective workarounds are available.
The ongoing exploitation of such long-standing vulnerabilities highlights a significant issue in the realm of cybersecurity. Meny Har, the CEO and co-founder of Opus Security, emphasized in a statement to Dark Reading that “legacy vulnerabilities often linger without resolution due to the overwhelming number of security concerns organizations grapple with today.” He added that without robust prioritization strategies, critical vulnerabilities may go unnoticed, posing a continuous threat to security.
Source
www.darkreading.com