We are using Cisco webvpn for remote access. While doing a security test, it was revealed:
- with webvpn enabled on any port other then the default (443) the webvpn http server responds to the url http://<webvpn_address>:<port#>/<anything.exe>
- you can change <anything.exe> to any text you wish, as long as it ends in .exe the asa sends the client a 0 byte .exe file
Has anyone came across such issue and how can it lead to security attack.
Thanks in advance.