Something no enterprise, individual or entity wants to hear “Oh, BTW, all your VPN are belong to us.”
Check out this quote from Cisco, “A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.”
Cisco gives a shout out to Cedric Halbronn, of NCC Group. On Twitter: @saidelike. Something worth checking out are NCC G’s related publications and tools, which are linked to from Cedric’s Publications page. The publication starts out at with a title of, “Cisco ASA series part one: Intro to the Cisco ASA,” then they move into, “We’ve spent a bunch of time investigating Cisco ASA devices and their firmware while looking into exploiting CVE-2016-1287, CVE-2016-6366, and other bugs. Part of this research has involved data mining numerous Cisco ASA firmware files to generate new exploit targets.”
“We took the time to write some tools to more effectively analyse or debug certain aspects of the exploits and automate a lot of the tasks we found repetitive. Many of these tools help speed up investigations of problems/bugs, debugging vulnerabilities and exploit states, and the general poking around of Cisco devices for research.”
Good stuff, considering they are the credited source.