Cisco Adaptive Security Device Manager and Adaptive Security Appliance Software Client-side Arbitrary Code Execution Vulnerability

<p>A vulnerability in the packaging of Cisco&nbsp;Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco&nbsp;Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco&nbsp;ASA Software.</p>
<p>This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco&nbsp;ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco&nbsp;ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco&nbsp;ASA Software.</li>
<li>Potential targets are limited to users who manage the same device that is running Cisco&nbsp;ASA Software using ASDM.</li>
</ul>
<p>Cisco&nbsp;has released and will release software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-asdm-sig-NPKvwDjm">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-asdm-sig-NPKvwDjm</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20829
Source: Cisco Security Advisory

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.