Tue | Jan 30, 2018 | 7:10 AM PST
Cisco says there are no workarounds for a recently discovered and "critical" security vulnerability for some of its products.
"A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code," the company says.
The vulnerability impacts Cisco ASA Software that is running on these specific products:
- 3000 Series Industrial Security Appliance (ISA)
- ASA 5500 Series Adaptive Security Appliances
- ASA 5500-X Series Next-Generation Firewalls
- ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
- ASA 1000V Cloud Firewall
- Adaptive Security Virtual Appliance (ASAv)
- Firepower 2100 Series Security Appliance
- Firepower 4110 Security Appliance
- Firepower 9300 ASA Security Module
- Firepower Threat Defense Software (FTD)
The place to go for more information and the patch is the Cisco security blog, which is where US-CERT will send you.
Cisco was very clear in its update that you can only download the fix and expect support for versions of the software you have purchased a license to use.
Most Popular
Comments