INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 9h Global malware Energy and Utilities CRITICAL 10h Global ransomware Multiple sectors CRITICAL 10h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 13h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 13h Global phishing Multiple sectors HIGH 14h Global insider Cybersecurity Services CRITICAL 14h Global ransomware Multiple sectors (U.S. companies) CRITICAL 14h Global data_breach Government CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 9h Global malware Energy and Utilities CRITICAL 10h Global ransomware Multiple sectors CRITICAL 10h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 13h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 13h Global phishing Multiple sectors HIGH 14h Global insider Cybersecurity Services CRITICAL 14h Global ransomware Multiple sectors (U.S. companies) CRITICAL 14h Global data_breach Government CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 9h Global malware Energy and Utilities CRITICAL 10h Global ransomware Multiple sectors CRITICAL 10h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 13h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 13h Global phishing Multiple sectors HIGH 14h Global insider Cybersecurity Services CRITICAL 14h Global ransomware Multiple sectors (U.S. companies) CRITICAL 14h
Vulnerabilities

CVE-2014-2120

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Cisco ASA WebVPN XSS Vulnerability Enables Session Hijacking
Published: Nov 12, 2024  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Cisco Adaptive Security Appliance (ASA) Cross-Site Scripting (XSS) Vulnerability — Cisco Adaptive Security Appliance (ASA) contains a cross-site scripting (XSS) vulnerability in the WebVPN login page. This vulnerability allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter.

🤖 AI Executive Summary

Cisco Adaptive Security Appliance (ASA) contains a critical cross-site scripting vulnerability in the WebVPN login page that allows remote attackers to inject malicious scripts via unspecified parameters. With a CVSS score of 9.0 and confirmed exploits available, this vulnerability poses severe risks to organizations using ASA devices for remote access VPN services.

📄 Description (Arabic)

تؤثر هذه الثغرة الأمنية على صفحة تسجيل الدخول لخدمة WebVPN في أجهزة Cisco ASA، حيث يمكن للمهاجمين استغلال معاملات غير محددة لحقن أكواد HTML أو JavaScript ضارة. عند نجاح الاستغلال، يمكن للمهاجم سرقة بيانات اعتماد المستخدمين، اختطاف الجلسات النشطة، أو إعادة توجيه المستخدمين إلى مواقع تصيد احتيالي. تعتبر هذه الثغرة خطيرة بشكل خاص لأن أجهزة ASA تُستخدم على نطاق واسع كبوابات أمنية للوصول عن بُعد في المؤسسات الحكومية والمالية. وجود استغلالات عملية متاحة يزيد من احتمالية الهجمات المستهدفة ضد البنية التحتية الحرجة.

🤖 ملخص تنفيذي (AI)

يحتوي جهاز Cisco Adaptive Security Appliance (ASA) على ثغرة حرجة من نوع البرمجة النصية عبر المواقع (XSS) في صفحة تسجيل دخول WebVPN تسمح للمهاجمين عن بُعد بحقن نصوص برمجية ضارة عبر معاملات غير محددة. مع درجة CVSS بلغت 9.0 ووجود استغلالات مؤكدة، تشكل هذه الثغرة مخاطر جسيمة على المؤسسات التي تستخدم أجهزة ASA لخدمات الشبكة الافتراضية الخاصة للوصول عن بُعد.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 10:15
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using Cisco ASA devices for remote access VPN, particularly in financial institutions regulated by SAMA and government entities under NCA oversight, face critical risks of credential theft and unauthorized access to internal networks. The vulnerability directly threatens secure remote access infrastructure essential for business continuity and compliance with national cybersecurity frameworks.
🏢 Affected Saudi Sectors
القطاع المالي والمصرفي الجهات الحكومية قطاع الاتصالات وتقنية المعلومات قطاع الطاقة والمرافق الحيوية قطاع الرعاية الصحية
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately upgrade all Cisco ASA devices to the latest patched firmware version as recommended by Cisco security advisories, prioritizing internet-facing WebVPN portals.
2. Implement Web Application Firewall (WAF) rules to filter malicious input on WebVPN login pages and enable strict input validation until patches can be applied.
3. Deploy multi-factor authentication (MFA) for all WebVPN access, monitor authentication logs for suspicious activities, and conduct security awareness training on phishing risks associated with XSS attacks.
🔧 خطوات المعالجة (العربية)
1. الترقية الفورية لجميع أجهزة Cisco ASA إلى أحدث إصدار من البرنامج الثابت المُصحح وفقاً لتوصيات Cisco الأمنية، مع إعطاء الأولوية لبوابات WebVPN المواجهة للإنترنت.
2. تطبيق قواعد جدار حماية تطبيقات الويب (WAF) لتصفية المدخلات الضارة على صفحات تسجيل دخول WebVPN وتفعيل التحقق الصارم من المدخلات حتى يتم تطبيق التحديثات الأمنية.
3. نشر المصادقة متعددة العوامل (MFA) لجميع عمليات الوصول عبر WebVPN، مراقبة سجلات المصادقة للأنشطة المشبوهة، وإجراء تدريب توعوي أمني حول مخاطر التصيد الاحتيالي المرتبطة بهجمات XSS.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 ECC-2-1 ECC-3-1 ECC-4-3
🔵 SAMA CSF
CYB-2.1 CYB-2.2 CYB-3.1 CYB-5.1
🟡 ISO 27001:2022
A.12.6.1 A.14.2.5 A.18.2.3
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Cisco:Adaptive Security Appliance (ASA)
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS63.87%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2024-12-03
Published 2024-11-12
Source Feed cisa_kev
Views 2
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.