Cisco released a security advisory linking this attack to vulnerability CVE-2023-20269, which “improperly separates authentication, authorization, and accounting (AAA) between the remote access VPN feature and HTTPS management and site-to-site VPN features.” This vulnerability applies to Cisco ASA software and the Cisco Firepower Threat Defense (FTD) software.
CVE-2023-20269 allows an attacker to send authentication requests to the interface for web access to the device. While the VPN access only allows a limited number of login attempts, the web access allowed for a brute force attack resulting in identifying valid credentials or establishing a clientless SSL VPN session (Cisco ASA 9.16 or earlier).
Mitigations: While there is not currently a patch for the vulnerability, here are workarounds provided by Cisco:
- Set up a dynamic access policy (DAP) to terminate VPN tunnels using DefaultADMINGroup or DefaultL2LGroup groups
- Deny VPN access with Default Group Policy (DfltGrpPolicy)
- Lock users in the LOCAL user database to a single profile with “group-lock”
- Disable Remote Access VPNs sessions for users that don’t require it