-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1895
    Cisco Products affected by Lasso SAML Implementation vulnerability
                                2 June 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Adaptive Security Appliance (ASA) Software
                   Cisco Content Security Management Appliance (SMA)
                   Cisco Email Security Appliance (ESA)
                   Cisco FXOS Software
                   Cisco Firepower Threat Defense (FTD) Software
                   Cisco Web Security Appliance (WSA)
                   Cisco Prime Collaboration Assurance
Publisher:         Cisco Systems
Operating System:  Cisco
                   Network Appliance
Impact/Access:     Provide Misleading Information -- Existing Account
                   Unauthorised Access            -- Existing Account
                   Reduced Security               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-28091  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lasso-saml-jun2021-DOXNRLkD

- --------------------------BEGIN INCLUDED TEXT--------------------

Lasso SAML Implementation Vulnerability Affecting Cisco Products: June 2021

Priority:        High
Advisory ID:     cisco-sa-lasso-saml-jun2021-DOXNRLkD
First Published: 2021 June 1 12:30 GMT
Last Updated:    2021 June 1 21:19 GMT
Version 1.1:     Interim
Workarounds:     No workarounds available
CVE Names:       CVE-2021-28091
CWEs:            CWE-269

Summary

  o On June 1, 2021, Lasso disclosed a security vulnerability in the Lasso
    Security Assertion Markup Language (SAML) Single Sign-On (SSO) library.
    This vulnerability could allow an authenticated attacker to impersonate
    another authorized user when interacting with an application.

    For a description of this vulnerability, see lasso.git NEWS .

    This advisory will be updated as additional information becomes available.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lasso-saml-jun2021-DOXNRLkD

Affected Products

  o Cisco is investigating its product line to determine which products may be
    affected by this vulnerability and the impact on each affected product. As
    the investigation progresses, Cisco will update this advisory with
    information about affected products.

    The Vulnerable Products section includes Cisco bug IDs for each affected
    product. The bugs are accessible through the Cisco Bug Search Tool and
    contain additional platform-specific information, including workarounds (if
    available) and fixed software releases.

    Vulnerable Products

    The following table lists Cisco products that are affected by the
    vulnerabilities that are described in this advisory. If a future release
    date is indicated for software, the date provided represents an estimate
    based on all information known to Cisco as of the Last Updated date at the
    top of the advisory. Availability dates are subject to change based on a
    number of factors, including satisfactory testing results and delivery of
    other priority features and fixes. If no version or date is listed for an
    affected component (indicated by a blank field and/or an advisory
    designation of Interim), Cisco is continuing to evaluate the fix and will
    update the advisory as additional information becomes available. After the
    advisory is marked Final, customers should refer to the associated Cisco
    bug(s) for further details.

                        Product                      Cisco Bug   Fixed Release
                                                         ID      Availability
                       Network and Content Security Devices
                                                                9.8.4.38 (Jun
                                                                2021)
                                                                9.12.4.24
    Cisco Adaptive Security Appliance (ASA) Software            (available)
    Affected features: Clientless WebVPN and         CSCvx73164 9.14.3 (Jun
    AnyConnect VPN (only when SSO is enabled)                   2021)
                                                                9.15.1.15
                                                                (available)
                                                                9.16.1.3
                                                                (available)
    Cisco Content Security Management Appliance                 13.8.1
    (SMA)                                            CSCvx73156 (available)
    Affected feature: Web-based management interface            14.1.0 (Jul
    (only when SSO is enabled)                                  2021)
    Cisco Email Security Appliance (ESA)                        14.0.0-692 GD
    Affected feature: Web-based management interface CSCvx73154 (available)
    (only when SSO is enabled)
                                                                2.2.2.149 (Jul
                                                                2021)
                                                                2.3.1.216 (Jul
                                                                2021)
                                                                2.6.1.230 (Jul
    Cisco FXOS Software                              CSCvx73164 2021)
                                                                2.7.1.143
                                                                (available)
                                                                2.8.1.152
                                                                (available)
                                                                2.9.1.143
                                                                (available)
    Cisco Web Security Appliance (WSA)               CSCvx73157 14.0.1 (Sep
                                                                2021)
                                                                6.4.0.12
                                                                (available)
    Cisco Firepower Threat Defense (FTD) Software               6.6.5 (Jul
    Affected feature: AnyConnect VPN ^1              CSCvx73164 2021)
                                                                6.7.0.2
                                                                (available)
                                                                7.0.0
                                                                (available)
                        Network Management and Provisioning
    Cisco Prime Collaboration Assurance              CSCvx73162 12.1 SP4 ES
                                                                (TBD)

    1. The AnyConnect VPN is configurable only through FlexConfig for Cisco FTD
    releases earlier than Release 6.7.

    The Cisco software releases listed in the following table have reached end
    of software maintenance . Customers are advised to migrate to a supported
    release that includes the fix for this vulnerability.

    Cisco Software                 End-of-Life Releases
                                   9.7 and earlier
    ASA Software                   9.9
                                   9.10
                                   9.13
    FXOS Software                  2.4.1
                                   2.7.1
                                   6.0.1 and earlier
    FTD Software                   6.2.0
                                   6.2.1
                                   6.5

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    products and services:

    Network and Content Security Devices

       Cisco AMP Virtual Private Cloud Appliance

    Network Management and Provisioning

       Cisco Prime Collaboration Provisioning

    Unified Computing

       Cisco UCS B-Series M5 Blade Servers
       Cisco UCS C-Series M5 Rack Servers - Managed

    Video, Streaming, TelePresence, and Transcoding Devices

       Cisco Video Surveillance Media Server
       Cisco Video Surveillance Operations Manager
       Cisco Vision Dynamic Signage Director

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o For information about fixed software releases , consult the Cisco bugs
    identified in the Vulnerable Products section of this advisory.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is aware that
    proof-of-concept exploit code is available for the vulnerability that are
    described in this advisory.

    The Cisco PSIRT is not aware of any malicious use of the vulnerabilities
    that are described in this advisory.

Source

  o Cisco would like to thank the Best Buy Enterprise Information Protection
    team and Sam Tinklenberg for discovering this vulnerability.

    Cisco would also like to thank Akamai for bringing this vulnerability to
    our attention and working with us on it.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lasso-saml-jun2021-DOXNRLkD

Revision History

  o +---------+--------------------------+------------+---------+-------------+
    | Version |       Description        |  Section   | Status  |    Date     |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated availability of  | Vulnerable |         |             |
    | 1.1     | first fixed releases for | Products   | Interim | 2021-JUN-01 |
    |         | Cisco FXOS Software.     |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    | 1.0     | Initial public release.  | -          | Interim | 2021-JUN-01 |
    +---------+--------------------------+------------+---------+-------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=mES+
-----END PGP SIGNATURE-----