Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1895.3 Cisco Products affected by Lasso SAML Implementation vulnerability 1 October 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Adaptive Security Appliance (ASA) Software Cisco Content Security Management Appliance (SMA) Cisco Email Security Appliance (ESA) Cisco FXOS Software Cisco Firepower Threat Defense (FTD) Software Cisco Web Security Appliance (WSA) Cisco Prime Collaboration Assurance Publisher: Cisco Systems Operating System: Cisco Network Appliance Impact/Access: Provide Misleading Information -- Existing Account Unauthorised Access -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-28091 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lasso-saml-jun2021-DOXNRLkD Revision History: October 1 2021: Cisco investigated and finalised their report August 10 2021: Updated ASA fixed release availability June 2 2021: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- Lasso SAML Implementation Vulnerability Affecting Cisco Products: June 2021 Priority: High Advisory ID: cisco-sa-lasso-saml-jun2021-DOXNRLkD First Published: 2021 JuneN 1 12:30 GMT Last Updated: 2021 September 30 14:51 GMT Version 1.4: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvx73154 CVE Names: CVE-2021-28091 CWEs: CWE-269 Summary o On June 1, 2021, Lasso disclosed a security vulnerability in the Lasso Security Assertion Markup Language (SAML) Single Sign-On (SSO) library. This vulnerability could allow an authenticated attacker to impersonate another authorized user when interacting with an application. For a description of this vulnerability, see lasso.git NEWS . This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lasso-saml-jun2021-DOXNRLkD Affected Products o Cisco investigated its product line to determine which products and services may be affected by this vulnerability. The Vulnerable Products section includes Cisco bug IDs for each affected product. The bugs are accessible through the Cisco Bug Search Tool and contain additional platform-specific information, including workarounds (if available) and fixed software releases. Vulnerable Products The following table lists Cisco products that are affected by the vulnerability that is described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details. Product Cisco Bug Fixed Release ID Availability Network and Content Security Devices 9.8.4.39 (available) 9.12.4.24 Cisco Adaptive Security Appliance (ASA) Software (available) Affected features: Clientless WebVPN and CSCvx73164 9.14.3 AnyConnect VPN (only when SSO is enabled) (available) 9.15.1.15 (available) 9.16.1.3 (available) Cisco Content Security Management Appliance 13.8.1-074 (SMA) CSCvx73156 (available) Affected feature: Web-based management interface 14.0.0-404 (only when SSO is enabled) (available) Cisco Email Security Appliance (ESA) 14.0.0-692 GD Affected feature: Web-based management interface CSCvx73154 (available) (only when SSO is enabled) 2.2.2.149 (available) 2.3.1.216 (available) 2.6.1.230 Cisco FXOS Software CSCvx73164 (available) 2.7.1.143 (available) 2.8.1.152 (available) 2.9.1.143 (available) Cisco Web Security Appliance (WSA) CSCvx73157 14.0.1-053 (available) 6.4.0.12 (available) Cisco Firepower Threat Defense (FTD) Software 6.6.5 Affected feature: AnyConnect VPN (only when SSO CSCvx73164 (available) is enabled) ^1 6.7.0.2 (available) 7.0.0 (available) Network Management and Provisioning Cisco Prime Collaboration Assurance CSCvx73162 None planned 1. The AnyConnect VPN is configurable only through FlexConfig for Cisco FTD releases earlier than Release 6.7. The Cisco software releases listed in the following table have reached end of software maintenance . Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco Software End-of-Life Releases 9.7 and earlier ASA Software 9.9 9.10 9.13 FXOS Software 2.4.1 2.7.1 6.0.1 and earlier FTD Software 6.2.0 6.2.1 6.5 Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following products and services: Network and Content Security Devices Cisco AMP Virtual Private Cloud Appliance Network Management and Provisioning Cisco Prime Collaboration Provisioning Unified Computing Cisco UCS B-Series M5 Blade Servers Cisco UCS C-Series M5 Rack Servers - Managed Video, Streaming, TelePresence, and Transcoding Devices Cisco Video Surveillance Media Server Cisco Video Surveillance Operations Manager Cisco Vision Dynamic Signage Director Workarounds o There are no workarounds that address this vulnerability. Fixed Software o For information about fixed software releases , consult the Cisco bugs identified in the Vulnerable Products section of this advisory. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerability that is described in this advisory. The Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory. Source o Cisco would like to thank the Best Buy Enterprise Information Protection team and Sam Tinklenberg for discovering this vulnerability. Cisco would also like to thank Akamai for bringing this vulnerability to our attention and working with us on it. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lasso-saml-jun2021-DOXNRLkD Revision History o +---------+--------------------------+------------+---------+-------------+ | Version | Description | Section | Status | Date | +---------+--------------------------+------------+---------+-------------+ | | Updated the advisory | | | | | | throughout to reflect | | | | | | that the investigation | Multiple | | | | 1.4 | is complete. Updated | sections | Final | 2021-SEP-30 | | | fixed release | | | | | | availability | | | | | | information. | | | | +---------+--------------------------+------------+---------+-------------+ | 1.3 | Updated ASA fixed | Vulnerable | Interim | 2021-JUN-15 | | | release availability. | Products | | | +---------+--------------------------+------------+---------+-------------+ | 1.2 | Updated FTD feature | Vulnerable | Interim | 2021-JUN-09 | | | impact. | Products | | | +---------+--------------------------+------------+---------+-------------+ | | Updated availability of | Vulnerable | | | | 1.1 | first fixed releases for | Products | Interim | 2021-JUN-01 | | | Cisco FXOS Software. | | | | +---------+--------------------------+------------+---------+-------------+ | 1.0 | Initial public release. | - | Interim | 2021-JUN-01 | +---------+--------------------------+------------+---------+-------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYVarc+NLKJtyKPYoAQh7gw//WcOr3YIsRHYTojhfDuQpH5v/Izlc59kx KR+JtdbrdtuBSkQrBPOUC8t8w6QpLKbMrfaRoOvNgQkZdGWBtIfudhl9rknEHJnZ 4m9Ea3IRgbX7hKJeg6TLgBN0S4Zldiu9E1QZxTZZ531lHuGGx6VgNo/fB35NU68q BDWuTrfT84bWgFEBiP+URqxFollzCFYOG+V+dEPWWgXfhafyhwnQYTDWd7RzeCfY Znkve63nulrFSf/Q0oxDLUA/cNMQ/vnMopKcs2l/of4deoz0rpFj/jWDWDGmf2Aj ZTBqQUQvS57VR9f2K6lKgXE/8PS3EOdvDjlUu5X5anrlt4ylYhtN2ZSpEUkDes/s RAO7gHOnFZPYRxjaEPcdD1XdyGpbGobtArkpFF4ugFc3R+KtxaUW6S9vn0G99YxL P+smItK96/44IXyehWFzwZqcRIkLdPKBGCnol3CrU7zckZCFQf3tFG1zuVVRNeBg O4MovLGv9ECt3H4fAbfOCO3lQFag71U/sxidcKiBn08MnS8ObaATollSB1iMfQwR yF/my5iD0j21aqJZoir5Jytn2J1m+kE+LS3FHd3EtWgVqOphwfyj2dDQSHuQ1YWk 9+mHgQrNpfV9sPSU445gy9K8ybHnds+NbNCdQZ15F4IeLLiVzB8ZP1m/iDHNSmJq RFmaMx8q8MI= =xl2p -----END PGP SIGNATURE-----