The NCCIC has released an advisory regarding several vulnerabilities affecting multiple Allen-Bradley Stratix 5950 Security Appliances running Cisco ASA v9.6.2 and earlier. The vulnerabilities include improper input validation, improper certificate validation, and resource management errors. Successful exploitation of these vulnerabilities could allow an attacker to bypass client certification to create connections to the affected device or cause the device to crash. These vulnerabilities are remotely exploitable. Currently there are no known public exploits; however, they could be successfully exploited by an attacker with a low skill level. Rockwell Automation will inform users of updated firmware as soon as it is available, and further recommends reviewing related Cisco advisories. Likewise, the NCCIC provides recommendations for employing network segmentation and boundary protection controls. Please review the full advisory for more details specific to affected versions, mitigations, and recommended workarounds. NCCIC/ICS-CERT.
You are here
Related Resources
Dec 12, 2024 in Cybersecurity, in Federal & State Resources, in Security Preparedness
Dec 12, 2024 in Cybersecurity, in OT-ICS Security, in Security Preparedness
Dec 12, 2024 in Cybersecurity, in OT-ICS Security, in Federal & State Resources