HomeCyber BalkansVulnerability in Cisco ASA Devices Allows SSH Remote Command Injection

Vulnerability in Cisco ASA Devices Allows SSH Remote Command Injection

Published on

spot_img

Cisco has recently issued a critical security advisory concerning a vulnerability in its Adaptive Security Appliance (ASA) Software that has the potential to allow remote attackers to execute commands with root-level privileges.

The flaw, identified as CVE-2024-20329, impacts devices operating on a vulnerable release of Cisco ASA Software with the CiscoSSH stack enabled. The vulnerability stems from inadequate validation of user input within the Secure Shell (SSH) subsystem. Exploitation of this flaw involves sending crafted input during remote command execution over SSH.

If successfully exploited, the attacker gains the ability to execute commands on the underlying operating system with root privileges. This could potentially lead to the attacker having full control over the affected system.

Given its severity, the vulnerability has been assigned a CVSS score of 9.9, making it critical due to the potential impact on confidentiality, integrity, and availability. Attackers with limited user privileges could leverage this flaw to elevate their access and compromise the entire system.

The affected Cisco products include those running vulnerable releases of ASA Software with SSH access enabled on at least one interface. To check if a device is affected, users can use the command ‘show running-config | include ssh’ to confirm the presence of ‘ssh stack ciscossh’ in the configuration.

To address this vulnerability, Cisco has released software updates, urging customers to upgrade to the fixed versions as soon as possible. For those unable to apply updates immediately, a workaround involves disabling the CiscoSSH stack using the command ‘no ssh stack ciscossh’. However, this action may disrupt active SSH sessions and should be tested for compatibility within the specific environment.

Customers with service contracts are eligible for free software updates from Cisco. Those without contracts can seek assistance from the Cisco Technical Assistance Center (TAC) to obtain the necessary updates. It is essential for customers to ensure that their devices have adequate memory and that the new releases support their current configurations.

This advisory is part of Cisco’s semiannual security publication for October 2024, which encompasses various ASA, FMC, and FTD Software advisories. Users are advised to regularly check Cisco’s Security Advisories page for up-to-date exposure assessments and upgrade solutions.

In conclusion, addressing this vulnerability promptly is crucial to safeguarding systems against potential exploitation by malicious actors. Cisco’s proactive approach in releasing software updates underscores the importance of ongoing vigilance and adherence to security best practices in the face of evolving cyber threats.

Source link

Latest articles

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

More like this

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...