Cisco on Monday up to date an advisory to warn clients of energetic exploitation of a decade-old safety flaw impacting its Adaptive Safety Equipment (ASA).
The vulnerability, tracked as CVE-2014-2120 (CVSS rating: 4.3), considerations a case of inadequate enter validation in ASA’s WebVPN login web page that would permit an unauthenticated, distant attacker to conduct a cross-site scripting (XSS) assault towards a focused consumer of the equipment.
“An attacker may exploit this vulnerability by convincing a consumer to entry a malicious hyperlink,” Cisco famous in an alert launched in March 2014.
As of December 2, 2024, the networking gear main has revised its bulletin to notice that it has turn into conscious of “further tried exploitation” of the vulnerability within the wild.
The event comes shortly after cybersecurity agency CloudSEK revealed that the risk actors behind AndroxGh0st are leveraging an in depth checklist of safety vulnerabilities in varied internet-facing purposes, together with CVE-2014-2120, to propagate the malware.
The malicious exercise can be notable for the combination of the Mozi botnet, which permits the botnet to additional develop in measurement and scope.
Consequently, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added the flaw to its Recognized Exploited Vulnerabilities (KEV) catalog final month, requiring Federal Civilian Government Department (FCEB) companies to remediate it by December 3, 2024.
Customers of Cisco ASA are extremely really helpful to maintain their installations up-to-date for optimum safety and to safeguard towards potential cyber threats.