CVE-2018-0101
📋 TL;DR
This critical vulnerability in Cisco ASA SSL VPN allows unauthenticated remote attackers to execute arbitrary code or cause system reloads via crafted XML packets. It affects multiple Cisco ASA and Firepower products with webvpn enabled. Attackers can gain full system control without authentication.
💻 Affected Systems
- Cisco ASA 3000 Series ISA
- ASA 5500 Series
- ASA 5500-X Series
- ASA Services Module
- ASA 1000V Cloud Firewall
- Adaptive Security Virtual Appliance (ASAv)
- Firepower 2100 Series
- Firepower 4110
- Firepower 9300 ASA Security Module
- Firepower Threat Defense Software (FTD)
📦 What is this software?
Adaptive Security Appliance Software by Cisco
View all CVEs affecting Adaptive Security Appliance Software →
Adaptive Security Appliance Software by Cisco
View all CVEs affecting Adaptive Security Appliance Software →
Adaptive Security Appliance Software by Cisco
View all CVEs affecting Adaptive Security Appliance Software →
Adaptive Security Appliance Software by Cisco
View all CVEs affecting Adaptive Security Appliance Software →
Adaptive Security Appliance Software by Cisco
View all CVEs affecting Adaptive Security Appliance Software →
Adaptive Security Appliance Software by Cisco
View all CVEs affecting Adaptive Security Appliance Software →
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with remote code execution, allowing attacker to gain full administrative control of the ASA device and pivot to internal networks.
Likely Case
Denial of service through system reloads, potentially disrupting VPN connectivity and network security functions.
If Mitigated
Limited impact if webvpn is disabled or proper network segmentation isolates vulnerable devices.
🎯 Exploit Status
Exploit code publicly available. Multiple proof-of-concepts demonstrate reliable exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple fixed versions depending on platform - see Cisco advisory for specific versions
Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1
Restart Required: Yes
Instructions:
1. Check current ASA version with 'show version'. 2. Download appropriate fixed version from Cisco. 3. Upload new image via TFTP/SCP. 4. Configure boot system. 5. Reload device.
🔧 Temporary Workarounds
Disable webvpn
allTemporarily disable the vulnerable webvpn feature if immediate patching isn't possible
no webvpn
write memory
Restrict access to webvpn interface
allApply access control lists to limit connections to webvpn interface
access-list WEBVPN_ACL deny ip any any
access-group WEBVPN_ACL in interface outside
🧯 If You Can't Patch
- Disable webvpn feature entirely if not required
- Implement strict network segmentation to isolate vulnerable devices from untrusted networks
🔍 How to Verify
Check if Vulnerable:
Check if webvpn is enabled: 'show running-config | include webvpn'. Check ASA version against affected versions in Cisco advisory.
Check Version:
show version | include Software
Verify Fix Applied:
Verify ASA version is updated to fixed version: 'show version | include Software'. Confirm webvpn configuration if re-enabled.
📡 Detection & Monitoring
Log Indicators:
- Multiple XML parsing errors in ASA logs
- Unexpected system reloads
- High volume of XML packets to webvpn interface
Network Indicators:
- Multiple crafted XML packets to TCP/443 (webvpn)
- Unusual traffic patterns to ASA webvpn interface
SIEM Query:
source="ASA" AND ("%ASA-3-722041" OR "webvpn" AND "XML")
🔗 References
- http://www.securityfocus.com/bid/102845
- http://www.securitytracker.com/id/1040292
- https://icanthackit.wordpress.com/2018/01/30/thoughts-on-the-handling-cve-2018-0101-cisco-bug-cscvg35618/
- https://pastebin.com/YrBcG2Ln
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1
- https://www.exploit-db.com/exploits/43986/
- http://www.securityfocus.com/bid/102845
- http://www.securitytracker.com/id/1040292
- https://icanthackit.wordpress.com/2018/01/30/thoughts-on-the-handling-cve-2018-0101-cisco-bug-cscvg35618/
- https://pastebin.com/YrBcG2Ln
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1
- https://www.exploit-db.com/exploits/43986/