Cisco on Monday up to date an advisory to warn clients of lively exploitation of a decade-old safety flaw impacting its Adaptive Safety Equipment (ASA).
The vulnerability, tracked as CVE-2014-2120 (CVSS rating: 4.3), considerations a case of inadequate enter validation in ASA’s WebVPN login web page that might permit an unauthenticated, distant attacker to conduct a cross-site scripting (XSS) assault towards a focused person of the equipment.
“An attacker might exploit this vulnerability by convincing a person to entry a malicious hyperlink,” Cisco famous in an alert launched in March 2014.
As of December 2, 2024, the networking gear main has revised its bulletin to notice that it has grow to be conscious of “extra tried exploitation” of the vulnerability within the wild.
The event comes shortly after cybersecurity agency CloudSEK revealed that the menace actors behind AndroxGh0st are leveraging an intensive checklist of safety vulnerabilities in varied internet-facing purposes, together with CVE-2014-2120, to propagate the malware.
The malicious exercise can also be notable for the mixing of the Mozi botnet, which permits the botnet to additional develop in dimension and scope.
In consequence, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added the flaw to its Recognized Exploited Vulnerabilities (KEV) catalog final month, requiring Federal Civilian Govt Department (FCEB) companies to remediate it by December 3, 2024.
Customers of Cisco ASA are extremely really useful to maintain their installations up-to-date for optimum safety and to safeguard towards potential cyber threats.