
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN301
_____________________________________________________________________

DATE                : 01/06/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Cisco ASA Software, Cisco SMA, Cisco ESA,
                          Cisco WSA, Cisco FTD Software.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lasso-saml-jun2021-DOXNRLkD
_____________________________________________________________________

Lasso SAML Implementation Vulnerability Affecting Cisco Products: June 2021

High

Advisory ID:      cisco-sa-lasso-saml-jun2021-DOXNRLkD
First Published:  2021 June 1 12:30 GMT
Version 1.0:      Interim
Workarounds:      No workarounds available

CVE-2021-28091
CWE-269


Summary
On June 1, 2021, Lasso disclosed a security vulnerability in the Lasso
Security Assertion Markup Language (SAML) Single Sign-On (SSO) library.
This vulnerability could allow an authenticated attacker to impersonate
another authorized user when interacting with an application.

For a description of this vulnerability, see lasso.git NEWS.

This advisory will be updated as additional information becomes
available.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lasso-saml-jun2021-DOXNRLkD


Affected Products

Cisco is investigating its product line to determine which products may
be affected by this vulnerability and the impact on each affected
product. As the investigation progresses, Cisco will update this
advisory with information about affected products.

The Vulnerable Products section includes Cisco bug IDs for each affected
product. The bugs are accessible through the Cisco Bug Search Tool and
contain additional platform-specific information, including workarounds
(if available) and fixed software releases.


Vulnerable Products

The following table lists Cisco products that are affected by the
vulnerabilities that are described in this advisory. If a future release
date is indicated for software, the date provided represents an estimate
based on all information known to Cisco as of the Last Updated date at
the top of the advisory. Availability dates are subject to change based
on a number of factors, including satisfactory testing results and
delivery of other priority features and fixes. If no version or date is
listed for an affected component (indicated by a blank field and/or an
advisory designation of Interim), Cisco is continuing to evaluate the
fix and will update the advisory as additional information becomes
available. After the advisory is marked Final, customers should refer to
the associated Cisco bug(s) for further details.


Product                        Cisco Bug ID   Fixed Release Availability
Network and Content Security Devices

Cisco Adaptive Security Appliance (ASA) Software
Affected features: Clientless WebVPN and AnyConnect VPN (only when SSO
is enabled)	CSCvx73164	9.8.4.38 (Jun 2021)
                                9.12.4.24 (available)
                                9.14.3 (Jun 2021)
                                9.15.1.15 (available)
                                9.16.1.3 (available)

Cisco Content Security Management Appliance (SMA)
Affected feature: Web-based management interface (only when SSO is
enabled)	CSCvx73156	13.8.1 (available)
14.1.0 (Jul 2021)

Cisco Email Security Appliance (ESA)
Affected feature: Web-based management interface (only when SSO is
enabled)	CSCvx73154	14.0.0-692 GD (available)

Cisco FXOS Software	CSCvx73164	2.2.2.149 (TBD)
                                        2.3.1.216 (available)
                                        2.6.1.230 (TBD)
                                        2.7.1.143 (available)
                                        2.8.1.152 (available)
                                        2.9.1.143 (available)

Cisco Web Security Appliance (WSA)  CSCvx73157	14.0.1 (Sep 2021)

Cisco Firepower Threat Defense (FTD) Software
Affected feature: AnyConnect VPN1   CSCvx73164	6.4.0.12 (available)
                                                6.6.5 (Jul 2021)
                                                6.7.0.2 (available)
                                                7.0.0 (available)

Network Management and Provisioning
Cisco Prime Collaboration Assurance	CSCvx73162     12.1 SP4 ES (TBD)

1. The AnyConnect VPN is configurable only through FlexConfig for Cisco
FTD releases earlier than Release 6.7.


The Cisco software releases listed in the following table have reached
end of software maintenance. Customers are advised to migrate to a
supported release that includes the fix for this vulnerability.

Cisco Software                 End-of-Life Releases
ASA Software	               9.7 and earlier
                               9.9
                               9.10
                               9.13

FXOS Software                  2.4.1
                               2.7.1

FTD Software                   6.0.1 and earlier
                               6.2.0
                               6.2.1
                               6.5


Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.

Cisco has confirmed that this vulnerability does not affect the
following products and services:

Network and Content Security Devices
  Cisco AMP Virtual Private Cloud Appliance

Network Management and Provisioning
  Cisco Prime Collaboration Provisioning

Unified Computing
  Cisco UCS B-Series M5 Blade Servers
  Cisco UCS C-Series M5 Rack Servers - Managed

Video, Streaming, TelePresence, and Transcoding Devices
  Cisco Video Surveillance Media Server
  Cisco Video Surveillance Operations Manager
  Cisco Vision Dynamic Signage Director


Workarounds

There are no workarounds that address this vulnerability.


Fixed Software

For information about fixed software releases, consult the Cisco bugs
identified in the Vulnerable Products section of this advisory.

When considering software upgrades, customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page, to determine exposure and a complete
upgrade solution.

In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new
release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their contracted
maintenance providers.


Exploitation and Public Announcements
The Cisco Product Security Incident Response Team (PSIRT) is aware that
proof-of-concept exploit code is available for the vulnerability that
are described in this advisory.

The Cisco PSIRT is not aware of any malicious use of the vulnerabilities
that are described in this advisory.


Source
Cisco would like to thank the Best Buy Enterprise Information Protection
team and Sam Tinklenberg for discovering this vulnerability

Cisco would also like to thank Akamai for bringing this vulnerability to
our attention and working with us on it.

URL
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lasso-saml-jun2021-DOXNRLkD


Revision History

Version	Description            Section	Status	Date
1.0	Initial public release.	—	Interim	2021-JUN-01


LEGAL DISCLAIMER

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT
YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS DOCUMENT AS NEW
INFORMATION BECOMES AVAILABLE.

A standalone copy or paraphrase of the text of this document that omits
the distribution URL is an uncontrolled copy and may lack important
information or contain factual errors. The information in this document
is intended for end users of Cisco products.


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================



