Cisco on Monday up to date an advisory to warn clients of energetic exploitation of a decade-old security flaw impacting its Adaptive Safety Equipment (ASA).
The vulnerability, tracked as CVE-2014-2120 (CVSS rating: 4.3), considerations a case of inadequate enter validation in ASA’s WebVPN login web page that might permit an unauthenticated, distant attacker to conduct a cross-site scripting (XSS) assault towards a focused consumer of the equipment.
“An attacker may exploit this vulnerability by convincing a consumer to entry a malicious hyperlink,” Cisco famous in an alert launched in March 2014.
As of December 2, 2024, the networking tools main has revised its bulletin to notice that it has turn into conscious of “further tried exploitation” of the vulnerability within the wild.
The event comes shortly after cybersecurity agency CloudSEK revealed that the risk actors behind AndroxGh0st are leveraging an in depth checklist of security vulnerabilities in varied internet-facing functions, together with CVE-2014-2120, to propagate the malware.
The malicious exercise can also be notable for the mixing of the Mozi botnet, which permits the botnet to additional develop in measurement and scope.
Because of this, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added the flaw to its Identified Exploited Vulnerabilities (KEV) catalog final month, requiring Federal Civilian Government Department (FCEB) businesses to remediate it by December 3, 2024.
Customers of Cisco ASA are extremely advisable to maintain their installations up-to-date for optimum safety and to safeguard towards potential cyber threats.