10
CVSSv3

CVE-2018-0101

Published: 29/01/2018 Updated: 15/08/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 10 | Impact Score: 6 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote malicious user to cause a reload of the affected system or to remotely execute code. The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system. An exploit could allow the malicious user to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device. This vulnerability affects Cisco ASA Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, ASA 1000V Cloud Firewall, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4110 Security Appliance, Firepower 9300 ASA Security Module, Firepower Threat Defense Software (FTD). Cisco Bug IDs: CSCvg35618.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco adaptive security appliance software

cisco firepower threat defense 6.0.0

cisco firepower threat defense 6.0.1

cisco firepower threat defense 6.2.0

cisco firepower threat defense 6.1.0

cisco firepower threat defense 6.2.2

cisco firepower threat defense 6.2.1

Vendor Advisories

Update from February 5, 2018: After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability In addition, it was also found that the original fix was incomplete so new fixed code versions are now available Please see the Fixed Software section for more information A vulnerabil ...

Exploits

# # Cisco ASA CVE-2018-0101 Crash PoC # # We basically just read: # wwwnccgrouptrust/globalassets/newsroom/uk/events/2018/02/reconbrx2018-robin-hood-vs-cisco-asapdf # # @zerosum0x0, @jennamagius, @aleph___naught # import requests, sys headers = {} headers['User-Agent'] = 'Open AnyConnect VPN Agent v708-265-gae481214-dirty' headers['Co ...
Cisco ASA crash proof of concept exploit ...

Github Repositories

Cisco ASA honeypot Cymmetria Research, 2018 wwwcymmetriacom/ Contact: research@cymmetriacom A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability It is released under the MIT license for the use of the community Usage Usage: asa_serverpy [OPTIONS] A low interaction honeypot for t

A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.

Cisco ASA honeypot Cymmetria Research, 2018 wwwcymmetriacom/ Contact: research@cymmetriacom A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability It is released under the MIT license for the use of the community Usage Usage: asa_serverpy [OPTIONS] A low interaction honeypot for t

蜜罐集合

感谢paralax/awesome-honeypots 提供了一个优秀的蜜罐列表,在工作中需要把每个需要用到的开源蜜罐下载下来,比较麻烦,因此创建此库是为了把所有相关的蜜罐都一次性下载下来并希望可以追踪其版本的变化。 更多优秀的列表请参阅 批量更新子模块脚本 git submodule foreach git pull

T-Pot 1811 T-Pot 1811 runs on the latest 1804x LTS Ubuntu Server Network Installer image, is based on docker, docker-compose and includes dockerized versions of the following honeypots adbhoney, ciscoasa, conpot, cowrie, dionaea, elasticpot, glastopf, glutton, heralding, honeytrap, mailoney, medpot, rdpy, snare, tanner Furthermore we use the following tools Cockpit for a

T-Pot 1811 T-Pot 1811 runs on the latest 1804x LTS Ubuntu Server Network Installer image, is based on docker, docker-compose and includes dockerized versions of the following honeypots adbhoney, ciscoasa, conpot, cowrie, dionaea, elasticpot, glastopf, glutton, heralding, honeytrap, mailoney, medpot, rdpy, snare, tanner Furthermore we use the following tools Cockpit for a

CVE-2018-0101-DOS-POC DOS source : pastebincom/YrBcG2Ln this POC is not released by me use at your own risk