Welcome back to another week of Cyber Threat Intelligence (CTI). This week's report highlights Cisco devices being targeted by ransomware gangs, a critical authentication bypass flaw for Cisco Broadworks, and a new zero-click, zero-day exploit found for iPhones.
The vulnerability, CVE-2023-20269, is a flaw in the web services interface of the Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) devices.
Abuse of this vulnerability allows the attacker to send authentication requests to the web services interface without limitation, effectively allowing the attacker to brute force credentials and gain access to the system.
It should be noted that several conditions need to be met for the vulnerability to be present:
If these conditions are met, and the attacker can successfully guess the correct username and password combination, they can establish a clientless SSL VPN connection.
In addition to the above conditions being required for the attack to occur, to establish the clientless SSL VPN connection, the clientless SSL VPN protocol must be allowed in the DfltGrpPolicy.
At the time of this writing, there is not a patch for this vulnerability. Instead, Cisco has released a set of steps that can be taken to mitigate the attack:
Arguably, the most crucial mitigating factor is the use of multi-factor authentication (MFA). Even if the threat actor can successfully brute-force account credentials, the extra authentication step would prevent the attacker from successfully authenticating.
Additionally, Cisco added a recommendation for catching attempted attacks.
To do this, secure the Default Remote Access VPN profiles by pointing all non-default profiles to a sinkhole AAA (dummy LDAP) server and enable logging. These logs will show the brute-force login attempts and allow administrators to act accordingly.
Additional Resources
Successful exploitation of this flaw can allow attackers to execute commands, access confidential data, alter user settings, and more.
Additionally, one of the following apps must be active on the platform in order to be vulnerable:
AuthenticationService |
BWCallCenter |
BWReceptionist |
CustomMediafilesRetrieval |
ModeratorClientApp |
PublicECLQuery |
PublicReporting |
UCAPI |
Xsi-Actions |
Xsi-Events |
Xsi-MMTel |
Xsi-VTR |
A final prerequisite for successful exploitation of this vulnerability is the attacker must have a valid user ID linked to the targeted Cisco BroadWorks system.
There are no reports of this vulnerability being exploited in the wild, but users are strongly urged to update to version AP.platform.23.0.1075.ap385341 as soon as possible.
It should be noted that this vulnerability impacts version 22.0, but Cisco will not be releasing a security update for that version, and users are strongly encouraged to upgrade to the version 23.0 branch and apply the security update.
Additional Resources
Users are strongly advised to install the latest security updates for each device: macOS Ventura 13.5.2, iOS 16.6.1, iPadOS 16.6.1, and watchOS 9.6.2. It should also be noted that placing devices in Lockdown Mode will successfully block this attack.
Additional Resources
PacketWatch publishes this report and other cybersecurity threat intel to the security community for free via our blog. If you are interested in personalized threat intel, contact us today to learn about our enterprise threat intelligence services.
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.