Avatar feed
Responses: 1
CW5 Regimental Chief Warrant Officer
0
0
0
Both vulnerabilities are mitigated by using the best business practices that have existed for a looooong time. If your company is currently vulnerable to these then I recommend getting another security engineer or administrator.

So the 1st vulnerability requires "An attacker must be authenticated to trigger this vulnerability" according to the Cisco Issues Security Advisory. The trick is to ensure that a person is authenticated before they are authorized. This happens through username and password, certificate, etc.
There are several guides out there detailing how to harden your security devices.

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-cli

The 2nd vulnerability requires "The attacker must know the SNMP community string to exploit this vulnerability"
So ensure they don't know the SNMP community string. These strings are essentially passwords. You can also limit those who are able to query SNMP packets by access list.

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp
(0)
Comment
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close