Security News > 2016 > August > Leaked EXTRABACON exploit can work on newer Cisco ASA firewalls (Help Net Security)

EXTRABACON, one of the Equation Group exploits leaked by the Shadow Brokers, can be made to work on a wider range of Cisco Adaptive Security Appliance (ASA) firewalls than previously reported. We successfully ported EXTRABACON to ASA 9.2(4) #ShadowBrokers #Cisco pic.twitter.com/UPG6yq9Km2 — SilentSignal (@SilentSignalHU) August 23, 2016 The leaked exploit of the zero-day buffer overflow vulnerability (CVE-2016-6366) in the SNMP code of the Cisco ASA, Cisco PIX, and Cisco Firewall Services Module can compromise versions … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Ol1yLyF7sMI/
Related news
- SonicWall firewall bug leveraged in attacks after PoC exploit release (source)
- PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices (source)
- Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? (source)
- Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility (source)
- Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection (source)
- GitHub expands security tools after 39 million secrets leaked in 2024 (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-08-18 | CVE-2016-6366 | Classic Buffer Overflow vulnerability in Cisco products Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON. | 8.8 |