CVE-2021-1573
📋 TL;DR
An unauthenticated remote attacker can send a malicious HTTPS request to Cisco ASA or FTD devices, causing them to reload and creating a denial of service condition. This affects devices with the web services interface enabled, potentially disrupting network security services.
💻 Affected Systems
- Cisco Adaptive Security Appliance (ASA) Software
- Cisco Firepower Threat Defense (FTD) Software
📦 What is this software?
Adaptive Security Appliance Software by Cisco
View all CVEs affecting Adaptive Security Appliance Software →
Adaptive Security Appliance Software by Cisco
View all CVEs affecting Adaptive Security Appliance Software →
Adaptive Security Appliance Software by Cisco
View all CVEs affecting Adaptive Security Appliance Software →
Adaptive Security Appliance Software by Cisco
View all CVEs affecting Adaptive Security Appliance Software →
⚠️ Risk & Real-World Impact
Worst Case
Complete network security outage as firewalls reload, allowing unfiltered traffic during the reload period and disrupting all protected services.
Likely Case
Temporary service disruption during firewall reloads, causing brief network outages and potential session drops for users.
If Mitigated
Minimal impact with proper network segmentation and redundant firewall configurations that can handle failover during reloads.
🎯 Exploit Status
Exploitation requires sending a specially crafted HTTPS request to the vulnerable interface. No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple fixed versions available - refer to Cisco advisory for specific version mapping
Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asafdt-webvpn-dos-KSqJAKPA
Restart Required: Yes
Instructions:
1. Check current ASA/FTD version. 2. Download appropriate fixed version from Cisco. 3. Backup configuration. 4. Apply update following Cisco upgrade procedures. 5. Verify successful upgrade and functionality.
🔧 Temporary Workarounds
Disable Web Services Interface
allDisable the vulnerable web services interface if not required
no webvpn
no http server enable
Restrict Access to Management Interface
allApply access control lists to limit which IPs can access the management interface
access-list MGMT-ACL permit ip [trusted-networks] any
http [ip-address] [mask] MGMT-ACL
🧯 If You Can't Patch
- Implement strict network segmentation to isolate management interfaces from untrusted networks
- Deploy redundant firewall pairs with failover to maintain service during potential reloads
🔍 How to Verify
Check if Vulnerable:
Check ASA/FTD version and compare against Cisco advisory. Verify if web services interface is enabled with 'show running-config | include webvpn|http server'
Check Version:
show version | include Version
Verify Fix Applied:
Verify upgraded version matches fixed versions in Cisco advisory. Test HTTPS connectivity to ensure functionality remains.
📡 Detection & Monitoring
Log Indicators:
- Unexpected device reloads
- Web services interface crash logs
- High volume of malformed HTTPS requests
Network Indicators:
- Spike in HTTPS traffic to management interfaces
- Unusual patterns in HTTPS request sizes or structures
SIEM Query:
source="asa" OR source="ftd" AND (event_type="reload" OR message="webvpn" OR message="http")