Hash: SHA256

             AUSCERT External Security Bulletin Redistribution

    Cisco Products affected by Lasso SAML Implementation vulnerability
                              1 October 2021


        AusCERT Security Bulletin Summary

Product:           Cisco Adaptive Security Appliance (ASA) Software
                   Cisco Content Security Management Appliance (SMA)
                   Cisco Email Security Appliance (ESA)
                   Cisco FXOS Software
                   Cisco Firepower Threat Defense (FTD) Software
                   Cisco Web Security Appliance (WSA)
                   Cisco Prime Collaboration Assurance
Publisher:         Cisco Systems
Operating System:  Cisco
                   Network Appliance
Impact/Access:     Provide Misleading Information -- Existing Account
                   Unauthorised Access            -- Existing Account
                   Reduced Security               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-28091  

Original Bulletin: 

Revision History:  October  1 2021: Cisco investigated and finalised their report
                   August  10 2021: Updated ASA fixed release availability
                   June     2 2021: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Lasso SAML Implementation Vulnerability Affecting Cisco Products: June 2021

Priority:        High
Advisory ID:     cisco-sa-lasso-saml-jun2021-DOXNRLkD
First Published: 2021 JuneN 1 12:30 GMT
Last Updated:    2021 September 30 14:51 GMT
Version 1.4:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvx73154
CVE Names:       CVE-2021-28091
CWEs:            CWE-269


  o On June 1, 2021, Lasso disclosed a security vulnerability in the Lasso
    Security Assertion Markup Language (SAML) Single Sign-On (SSO) library.
    This vulnerability could allow an authenticated attacker to impersonate
    another authorized user when interacting with an application.

    For a description of this vulnerability, see lasso.git NEWS .

    This advisory is available at the following link:

Affected Products

  o Cisco investigated its product line to determine which products and
    services may be affected by this vulnerability.

    The Vulnerable Products section includes Cisco bug IDs for each affected
    product. The bugs are accessible through the Cisco Bug Search Tool and
    contain additional platform-specific information, including workarounds (if
    available) and fixed software releases.

    Vulnerable Products

    The following table lists Cisco products that are affected by the
    vulnerability that is described in this advisory. If a future release date
    is indicated for software, the date provided represents an estimate based
    on all information known to Cisco as of the Last Updated date at the top of
    the advisory. Availability dates are subject to change based on a number of
    factors, including satisfactory testing results and delivery of other
    priority features and fixes. If no version or date is listed for an
    affected component (indicated by a blank field and/or an advisory
    designation of Interim), Cisco is continuing to evaluate the fix and will
    update the advisory as additional information becomes available. After the
    advisory is marked Final, customers should refer to the associated Cisco
    bug(s) for further details.

                        Product                      Cisco Bug   Fixed Release
                                                         ID      Availability
                       Network and Content Security Devices
    Cisco Adaptive Security Appliance (ASA) Software            (available)
    Affected features: Clientless WebVPN and         CSCvx73164 9.14.3
    AnyConnect VPN (only when SSO is enabled)                   (available)
    Cisco Content Security Management Appliance                 13.8.1-074
    (SMA)                                            CSCvx73156 (available)
    Affected feature: Web-based management interface            14.0.0-404
    (only when SSO is enabled)                                  (available)
    Cisco Email Security Appliance (ESA)                        14.0.0-692 GD
    Affected feature: Web-based management interface CSCvx73154 (available)
    (only when SSO is enabled)
    Cisco FXOS Software                              CSCvx73164 (available)
    Cisco Web Security Appliance (WSA)               CSCvx73157 14.0.1-053
    Cisco Firepower Threat Defense (FTD) Software               6.6.5
    Affected feature: AnyConnect VPN (only when SSO  CSCvx73164 (available)
    is enabled) ^1                                    
                        Network Management and Provisioning
    Cisco Prime Collaboration Assurance              CSCvx73162 None planned

    1. The AnyConnect VPN is configurable only through FlexConfig for Cisco FTD
    releases earlier than Release 6.7.

    The Cisco software releases listed in the following table have reached end
    of software maintenance . Customers are advised to migrate to a supported
    release that includes the fix for this vulnerability.

    Cisco Software                 End-of-Life Releases
                                   9.7 and earlier
    ASA Software                   9.9
    FXOS Software                  2.4.1
                                   6.0.1 and earlier
    FTD Software                   6.2.0

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    products and services:

    Network and Content Security Devices

       Cisco AMP Virtual Private Cloud Appliance

    Network Management and Provisioning

       Cisco Prime Collaboration Provisioning

    Unified Computing

       Cisco UCS B-Series M5 Blade Servers
       Cisco UCS C-Series M5 Rack Servers - Managed

    Video, Streaming, TelePresence, and Transcoding Devices

       Cisco Video Surveillance Media Server
       Cisco Video Surveillance Operations Manager
       Cisco Vision Dynamic Signage Director


  o There are no workarounds that address this vulnerability.

Fixed Software

  o For information about fixed software releases , consult the Cisco bugs
    identified in the Vulnerable Products section of this advisory.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance

    The Cisco Product Security Incident Response Team (PSIRT) validates only
    the affected and fixed release information that is documented in this

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is aware that
    proof-of-concept exploit code is available for the vulnerability that is
    described in this advisory.

    The Cisco PSIRT is not aware of any malicious use of the vulnerability that
    is described in this advisory.


  o Cisco would like to thank the Best Buy Enterprise Information Protection
    team and Sam Tinklenberg for discovering this vulnerability.

    Cisco would also like to thank Akamai for bringing this vulnerability to
    our attention and working with us on it.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.


  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lasso-saml-jun2021-DOXNRLkD

Revision History

  o +---------+--------------------------+------------+---------+-------------+
    | Version |       Description        |  Section   | Status  |    Date     |
    |         | Updated the advisory     |            |         |             |
    |         | throughout to reflect    |            |         |             |
    |         | that the investigation   | Multiple   |         |             |
    | 1.4     | is complete. Updated     | sections   | Final   | 2021-SEP-30 |
    |         | fixed release            |            |         |             |
    |         | availability             |            |         |             |
    |         | information.             |            |         |             |
    | 1.3     | Updated ASA fixed        | Vulnerable | Interim | 2021-JUN-15 |
    |         | release availability.    | Products   |         |             |
    | 1.2     | Updated FTD feature      | Vulnerable | Interim | 2021-JUN-09 |
    |         | impact.                  | Products   |         |             |
    |         | Updated availability of  | Vulnerable |         |             |
    | 1.1     | first fixed releases for | Products   | Interim | 2021-JUN-01 |
    |         | Cisco FXOS Software.     |            |         |             |
    | 1.0     | Initial public release.  | -          | Interim | 2021-JUN-01 |

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967