Introduction
This document describes recommendations to consider against password-spray attacks aimed at Remote Access VPN services in Secure Firewall.
Background Information
Password spray attacks are a type of brute-force attack where an attacker attempts to gain unauthorized access to multiple user accounts by systematically trying a few commonly used passwords across many accounts. Successful password spray attacks can lead to unauthorized access to sensitive information, data breaches, and potential compromises of network integrity
Moreover, these attacks, even when unsuccessful in their attempt to gain access, can consume computational resources from the Secure Firewall and prevent valid users from connecting to the remote access VPN services.
Observed Behaviors
When your Secure Firewall is targeted by password-spray attacks in Remote Access VPN services, you can identify these attacks by monitoring syslogs and using specific show commands. The most common behaviors to look for include:
Unusual Amount of Rejected Authentication Requests
The VPN headend Cisco Secure Firewall ASA or FTD shows symptoms of password-spray attacks with an unusual rate of rejected authentication attempts.
Note: These unusual attempts to authenticate can be directed towards either the LOCAL database or external authentication servers.
The best way to detect this is by looking at the syslog. Look for an unusual number of any of the next ASA syslog IDs:
%ASA-6-113015: AAA user authentication Rejected : reason = User was not found : local database : user = admin : user IP = x.x.x.x
%ASA-6-113005: AAA user authentication Rejected : reason = Unspecified : server = x.x.x.x : user = ***** : user IP = x.x.x.x
%ASA-6-716039: Group <DfltGrpPolicy> User <admin> IP <x.x.x.x> Authentication: rejected, Session Type: WebVPN.
The username is always hidden until the no logging hide username command is configured on the ASA.
Note: This gives insight into verifying if valid users are generated or known by offending IPs however, please be cautious as usernames will be visible in the logs.
To verify, log in to the ASA or FTD Command Line Interface (CLI), run the show aaa-server command, and investigate for an unusual number of attempted and rejected authentication requests to any of the configured AAA servers:
ciscoasa# show aaa-server
Server Group: LDAP-SERVER - - - - - >>>> Sprays against external server
Server Protocol: ldap
Server Hostname: ldap-server.example.com
Server Address: 10.10.10.10
Server port: 636
Server status: ACTIVE, Last transaction at unknown
Number of pending requests 0
Average round trip time 0ms
Number of authentication requests 2228536 - - - - - >>>> Unusual increments
Number of authorization requests 0
Number of accounting requests 0
Number of retransmissions 0
Number of accepts 1312
Number of rejects 2225363 - - - - - >>>> Unusual increments / Unusual rejection rate
Number of challenges 0
Number of malformed responses 0
Number of bad authenticators 0
Number of timeouts 1
Number of unrecognized responses 0
Recommendations
Consider and apply the next recommendations.
1. Enable Logging.
Logging is a crucial part of cybersecurity that involves recording events happening within a system. The absence of detailed logs leaves gaps in understanding, hindering a clear analysis of the attack method. It is recommended that you enable logging to a remote syslog server for improved correlation and auditing of network and security incidents across various network devices.
For information on how to configure logging, see the next platform-specific guides:
Cisco ASA Software:
Cisco FTD Software:
Note: The syslog message IDs necessary to verify the behaviors outlined in this document (113015, 113005 & 716039), must be enabled at the informational level (6). These IDs fall within the 'auth' and 'webvpn' logging classes.
2. Configure Threat Detection Features or Hardening Measures for Remote Access VPN.
To help mitigate the impact and reduce the likelihood of occurrence of these brute-force attacks on your RAVPN connections, you can review and apply the next configuration options:
Option 1 (recommended): Configure Threat Detection for Remote Access VPN Services.
Threat detection features for remote access VPN services help prevent Denial of Service (DoS) attacks from IPv4 addresses by automatically blocking the host (IP address) that exceeds the configured thresholds to prevent further attempts until you manually remove the shun of the IP address. There are separate services available for the following types of attack:
- Repeated failed authentication attempts to remote access VPN services (brute-force username/password scanning attacks).
- Client initiation attacks, where the attacker starts but does not complete the connection attempts to a remote access VPN headend repeated times from a single host.
- Connection attempts to invalid remote access VPN services. That is, when attackers try to connect to specific built-in tunnel groups intended solely for the internal functioning of the device. Legitimate endpoints should never attempt to connect to these tunnel groups.
These threat detection features are currently supported in the Cisco Secure Firewall versions listed next:
ASA Software:
- 9.16 version train -> supported from 9.16(4)67 and newer versions within this specific train.
- 9.17 version train -> supported from 9.17(1)45 and newer versions within this specific train.
- 9.18 version train -> supported from 9.18(4)40 and newer versions within this specific train.
- 9.19 version train -> supported from 9.19(1).37 and newer versions within this specific train.
- 9.20 version train -> supported from 9.20(3) and newer versions within this specific train.
- 9.22 version train -> supported from 9.22(1.1) and any newer versions.
FTD Software:
- 7.0 version train -> supported from 7.0.6.3 and newer versions within this specific train.
- 7.2 version train -> supported from 7.2.9 and newer version within this specific train.
- 7.4 version train -> supported from 7.4.2.1 and newer version within this specific train.
- 7.6 version train -> supported from 7.6.0 and any newer versions.
Note: These features are currently not supported in version trains 7.1 or 7.3.
For full details and configuration guidance, please refer to the next documents:
Option 2: Apply Hardening Measures for Remote Access VPN.
Note: These measures only help to reduce the risk, but are not a preventive measure against DoS attacks aimed at RAVPN services.
If the threat detection features for Remote Access VPN services are not supported in your Secure Firewall version, implement the following hardening measures to lower the risk of impact from these attacks:
- Disable AAA Authentication in the DefaultWEBVPN and DefaultRAGroup Connection Profiles (step-by-step:ASA|FTD managed by FMC).
- Disable Secure Firewall Posture (Hostscan) from the DefaultWEBVPNGroup and DefaultRAGroup (step-by-step: ASA|FTD managed by FMC).
- Disable Group-aliases and Enable Group-URLs in the rest of the connection profiles (step-by-step: ASA|FTD managed by FMC).
Note: If you require support with FTD managed through local Firewall Device Management (FDM), please contact the Technical Assistance Center (TAC) for expert guidance..
For further details please refer to the Implement Hardening Measures for Secure Client AnyConnect VPN guide.
Related Behaviors
Users can experience inability to establish VPN connections with Cisco Secure Client (AnyConnect) when Firewall Posture (HostScan) is enabled on Secure Firewall. They can intermittently encounter an error message that states, "Unable to complete connection. Cisco Secure Desktop not installed on the client.".
This behavior is a consequence of the successful exploitation of the vulnerability CVE-2024-20481 described next.
Cisco Bug ID CSCwj45822: Cisco ASA and FTD Software Remote Access VPN Brute Force Denial of Service Vulnerability (CVE-2024-20481)
This vulnerability arises from resource exhaustion due to password spray attacks, where attackers send numerous VPN authentication requests to the target device. Successful exploitation can lead to a Denial of Service (DoS) for the RAVPN service. A key symptom of this exploit is when users intermittently encounter the "Unable to complete connection. Cisco Secure Desktop not installed on the client." error message when they attempt to establish a RAVPN connection using Cisco Secure Client.
To fix this vulnerability, it is necessary to upgrade to the software versions listed in the security advisory. Additionally, it is recommended that you enable threat-detection features for Remote Access VPN after your Secure Firewall is upgraded to these versions to protect it against DoS attacks aimed at RAVPN services.
Please refer to the Cisco ASA and FTD Software Remote Access VPN Brute Force Denial of Service Vulnerability security advisory for full details.
Additional Information