Skip to main content

Cisco Adaptive Security Appliance SSL Bypass Vulnerability

A vulnerability exists in the Secure Sockets Layer (SSL) virtual private network (VPN) Client Certificate Authentication feature for Cisco's Adaptive Security Appliance (ASA).
Report a cyber attack: call 0300 303 5222 or email [email protected]

This content has been archived

This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk

Summary

A vulnerability exists in the Secure Sockets Layer (SSL) virtual private network (VPN) Client Certificate Authentication feature for Cisco's Adaptive Security Appliance (ASA).

Threat details

This could allow an unauthenticated, remote user to bypass certain SSL certificate verification steps.

Incorrect verification of SSL client certificates can be exploited by an attacker connecting to the ASA VPN without proper private key certificate pairs. This would allow them to establish a successful VPN connection, at which point they would have full network access


Remediation steps

Type Step
Cisco have released an update that addresses this vulnerability. Users are encouraged to visit the Cisco Security Advisory and apply this update

Last edited: 17 February 2020 12:39 pm