Cisco ASA SNMP Packet Handling RCE (CSCva92151) (EXTRABACON)
High Nessus Plugin ID 93113
SynopsisThe remote device is missing a vendor-supplied security patch.
DescriptionAccording to its banner and configuration, the version of the remote Cisco Adaptive Security Appliance (ASA) device is affected by a remote code execution vulnerability, known as EXTRABACON, in the Simple Network Management Protocol (SNMP) code due to a buffer overflow condition. An authenticated, remote attacker can exploit this, via specially crafted IPv4 SNMP packets, to cause a denial of service condition or the execution of arbitrary code. Note that an attacker must know the SNMP community string in order to exploit the vulnerability.
EXTRABACON is one of multiple Equation Group vulnerabilities and exploits disclosed on 2016/08/14 by a group known as the Shadow Brokers.
SolutionUpgrade to the relevant fixed version referenced in Cisco bug ID CSCva92151. Alternatively, as a workaround, change the SNMP community string, and only allow trusted users to have SNMP access.
Additionally, administrators can monitor affected systems using the 'snmp-server' host command.