{"id":2765,"date":"2018-02-02T19:00:16","date_gmt":"2018-02-02T19:00:16","guid":{"rendered":"https:\/\/ptp.cloud\/ptp\/?p=2765"},"modified":"2025-06-25T01:42:25","modified_gmt":"2025-06-25T05:42:25","slug":"cisco-asa-remote-code-execution-vulnerability","status":"publish","type":"post","link":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/","title":{"rendered":"Cisco ASA Remote Code Execution and Denial of Service Vulnerability"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p><a href=\"https:\/\/www.cisco.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5460  alignleft\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/10\/Cisco-logo-300x158.png\" alt=\"\" width=\"196\" height=\"103\" \/><\/a><\/p>\n<p data-start=\"521\" data-end=\"906\">A <strong data-start=\"523\" data-end=\"549\">critical vulnerability<\/strong> has been identified in the <strong data-start=\"577\" data-end=\"611\">Secure Sockets Layer (SSL) VPN<\/strong> functionality of <strong data-start=\"629\" data-end=\"681\">Cisco Adaptive Security Appliance (ASA) Software<\/strong>, potentially allowing <strong data-start=\"704\" data-end=\"740\">unauthenticated remote attackers<\/strong> to execute code or crash affected devices. This vulnerability affects multiple Cisco ASA products and poses a severe threat to enterprise security if left unpatched.<\/p>\n<h3 data-start=\"908\" data-end=\"921\">Summary<\/h3>\n<p data-start=\"922\" data-end=\"1240\">The issue stems from a memory handling error where a region of memory may be double-freed when the <code data-start=\"1021\" data-end=\"1029\">webvpn<\/code> feature is enabled. By sending specially crafted XML packets to a <code data-start=\"1096\" data-end=\"1104\">webvpn<\/code>-configured interface, attackers can cause a system crash or execute arbitrary code, potentially gaining <strong data-start=\"1209\" data-end=\"1239\">full control of the device<\/strong>.<\/p>\n<h3 data-start=\"1242\" data-end=\"1265\">Affected Products<\/h3>\n<p data-start=\"1266\" data-end=\"1337\">This vulnerability impacts Cisco ASA Software running on the following:<\/p>\n<ul data-start=\"1339\" data-end=\"1676\">\n<li data-start=\"1339\" data-end=\"1396\">\n<p data-start=\"1341\" data-end=\"1396\">Cisco 3000 Series Industrial Security Appliance (ISA)<\/p>\n<\/li>\n<li data-start=\"1397\" data-end=\"1439\">\n<p data-start=\"1399\" data-end=\"1439\">ASA 5500 \/ ASA 5500-X Series Firewalls<\/p>\n<\/li>\n<li data-start=\"1440\" data-end=\"1507\">\n<p data-start=\"1442\" data-end=\"1507\">ASA Services Module for Cisco Catalyst 6500 \/ Cisco 7600 Series<\/p>\n<\/li>\n<li data-start=\"1508\" data-end=\"1536\">\n<p data-start=\"1510\" data-end=\"1536\">ASA 1000V Cloud Firewall<\/p>\n<\/li>\n<li data-start=\"1537\" data-end=\"1583\">\n<p data-start=\"1539\" data-end=\"1583\">Adaptive Security Virtual Appliance (ASAv)<\/p>\n<\/li>\n<li data-start=\"1584\" data-end=\"1634\">\n<p data-start=\"1586\" data-end=\"1634\">Firepower 2100, 4110, 9300 ASA Security Module<\/p>\n<\/li>\n<li data-start=\"1635\" data-end=\"1676\">\n<p data-start=\"1637\" data-end=\"1676\">Firepower Threat Defense Software (FTD)<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1678\" data-end=\"1694\">Resolution<\/h3>\n<p data-start=\"1695\" data-end=\"1871\">There are <strong data-start=\"1705\" data-end=\"1729\">no known workarounds<\/strong> at this time. <strong data-start=\"1744\" data-end=\"1783\">Cisco has released software patches<\/strong> that fully address the vulnerability. Customers should prioritize patching immediately.<\/p>\n<p data-start=\"1695\" data-end=\"1871\"><a href=\"https:\/\/tools.cisco.com\/security\/center\/publicationListing.x\" style=\"font-size: 14px;\">Patches are available here<\/a><\/p>\n<p data-start=\"1695\" data-end=\"1871\"><span style=\"font-size: 14px;\">For organizations without the internal resources to patch or validate remediation across environments, <\/span><strong data-start=\"2109\" data-end=\"2144\" style=\"font-size: 14px;\">PTP\u2019s managed security services<\/strong><span style=\"font-size: 14px;\"> can help you act fast and mitigate risk.<\/span><\/p>\n<ul data-start=\"1873\" data-end=\"2004\"><\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f2f2f2&#8243; custom_margin=&#8221;27px|auto||auto||&#8221; custom_padding=&#8221;18px|18px|18px|18px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p data-start=\"359\" data-end=\"580\"><strong data-start=\"2192\" data-end=\"2225\">Secure your environment today<\/strong><br data-start=\"2225\" data-end=\"2228\" \/>Prevent exploitation of vulnerabilities with expert-managed security and response.<\/p>\n[\/et_pb_text][dsm_button button_one_text=&#8221;\ud83d\udc49 Claim your 50% off security assessment&#8221; button_one_url=&#8221;https:\/\/ptp.cloud\/services\/secops\/security-risk-assessment\/&#8221; button_two_text=&#8221;\ud83d\udc49 PTP&#8217;s AWS Marketplace Offers&#8221; button_two_url=&#8221;https:\/\/aws.amazon.com\/marketplace\/seller-profile?id=40aef862-90e2-4a5f-9d98-2ef74b6cbf15&#8243; button_alignment=&#8221;left&#8221; separator_text=&#8221;or explore&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;14px&#8221; button_one_text_color=&#8221;#ffffff&#8221; button_one_bg_color=&#8221;#0eabf4&#8243; button_one_border_width=&#8221;0px&#8221; button_one_border_radius=&#8221;3px&#8221; button_one_font=&#8221;|600|||||||&#8221; button_one_use_icon=&#8221;off&#8221; button_one_custom_margin=&#8221;|11px|||false|false&#8221; custom_button_two=&#8221;on&#8221; button_two_text_size=&#8221;14px&#8221; button_two_text_color=&#8221;#ffffff&#8221; button_two_bg_color=&#8221;#0eabf4&#8243; button_two_border_width=&#8221;0px&#8221; button_two_border_radius=&#8221;3px&#8221; button_two_font=&#8221;|600|||||||&#8221; button_two_use_icon=&#8221;off&#8221; custom_margin=&#8221;|||0px|false|false&#8221; box_shadow_style_button_one=&#8221;preset2&#8243; box_shadow_style_button_two=&#8221;preset2&#8243; box_shadow_blur_button_two=&#8221;19px&#8221; global_colors_info=&#8221;{}&#8221;][\/dsm_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>A critical vulnerability has been identified in the Secure Sockets Layer (SSL) VPN functionality of Cisco Adaptive Security Appliance (ASA) Software, potentially allowing unauthenticated remote attackers to execute code or crash affected devices. This vulnerability affects multiple Cisco ASA products and poses a severe threat to enterprise security if left unpatched. Summary The issue stems [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2768,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10],"tags":[],"table_tags":[],"class_list":["post-2765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secops-archive"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cisco ASA RCE and DoS Vulnerability \u2013 Security Alert<\/title>\n<meta name=\"description\" content=\"A critical Cisco ASA vulnerability enables remote code execution and denial of service. Learn which systems are impacted and how to mitigate risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco ASA RCE and DoS Vulnerability \u2013 Security Alert\" \/>\n<meta property=\"og:description\" content=\"A critical Cisco ASA vulnerability enables remote code execution and denial of service. Learn which systems are impacted and how to mitigate risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PTPCloud\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-02T19:00:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T05:42:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-alert-post-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PTPstaff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:site\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PTPstaff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/\"},\"author\":{\"name\":\"PTPstaff\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5\"},\"headline\":\"Cisco ASA Remote Code Execution and Denial of Service Vulnerability\",\"datePublished\":\"2018-02-02T19:00:16+00:00\",\"dateModified\":\"2025-06-25T05:42:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/\"},\"wordCount\":573,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-alert-post-feature.jpg\",\"articleSection\":[\"SecOps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/\",\"url\":\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/\",\"name\":\"Cisco ASA RCE and DoS Vulnerability \u2013 Security Alert\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-alert-post-feature.jpg\",\"datePublished\":\"2018-02-02T19:00:16+00:00\",\"dateModified\":\"2025-06-25T05:42:25+00:00\",\"description\":\"A critical Cisco ASA vulnerability enables remote code execution and denial of service. Learn which systems are impacted and how to mitigate risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#primaryimage\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-alert-post-feature.jpg\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-alert-post-feature.jpg\",\"width\":400,\"height\":250,\"caption\":\"Security alert regarding a vulnerability in Cisco ASA Software's SSL VPN functionality.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ptp.cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco ASA Remote Code Execution and Denial of Service Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ptp.cloud\/#website\",\"url\":\"https:\/\/ptp.cloud\/\",\"name\":\"PTP | Cloud Experts | Biotech Enablers\",\"description\":\"Helping innovative life sciences companies to get treatments to market faster.\",\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ptp.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ptp.cloud\/#organization\",\"name\":\"Pinnacle Technology Partners\",\"alternateName\":\"PTP\",\"url\":\"https:\/\/ptp.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"width\":409,\"height\":181,\"caption\":\"Pinnacle Technology Partners\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PTPCloud\",\"https:\/\/x.com\/PTPCloud\",\"https:\/\/www.linkedin.com\/company\/pinnacletechpartners\",\"https:\/\/www.youtube.com\/@ptp4766\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5\",\"name\":\"PTPstaff\",\"sameAs\":[\"https:\/\/ptpcloud.mystagingwebsite.com\/ptp\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco ASA RCE and DoS Vulnerability \u2013 Security Alert","description":"A critical Cisco ASA vulnerability enables remote code execution and denial of service. Learn which systems are impacted and how to mitigate risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Cisco ASA RCE and DoS Vulnerability \u2013 Security Alert","og_description":"A critical Cisco ASA vulnerability enables remote code execution and denial of service. Learn which systems are impacted and how to mitigate risks.","og_url":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/","og_site_name":"PTP | Cloud Experts | Biotech Enablers","article_publisher":"https:\/\/www.facebook.com\/PTPCloud","article_published_time":"2018-02-02T19:00:16+00:00","article_modified_time":"2025-06-25T05:42:25+00:00","og_image":[{"width":400,"height":250,"url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-alert-post-feature.jpg","type":"image\/jpeg"}],"author":"PTPstaff","twitter_card":"summary_large_image","twitter_creator":"@PTPCloud","twitter_site":"@PTPCloud","twitter_misc":{"Written by":"PTPstaff","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#article","isPartOf":{"@id":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/"},"author":{"name":"PTPstaff","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5"},"headline":"Cisco ASA Remote Code Execution and Denial of Service Vulnerability","datePublished":"2018-02-02T19:00:16+00:00","dateModified":"2025-06-25T05:42:25+00:00","mainEntityOfPage":{"@id":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/"},"wordCount":573,"commentCount":0,"publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"image":{"@id":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-alert-post-feature.jpg","articleSection":["SecOps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/","url":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/","name":"Cisco ASA RCE and DoS Vulnerability \u2013 Security Alert","isPartOf":{"@id":"https:\/\/ptp.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-alert-post-feature.jpg","datePublished":"2018-02-02T19:00:16+00:00","dateModified":"2025-06-25T05:42:25+00:00","description":"A critical Cisco ASA vulnerability enables remote code execution and denial of service. Learn which systems are impacted and how to mitigate risks.","breadcrumb":{"@id":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#primaryimage","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-alert-post-feature.jpg","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-alert-post-feature.jpg","width":400,"height":250,"caption":"Security alert regarding a vulnerability in Cisco ASA Software's SSL VPN functionality."},{"@type":"BreadcrumbList","@id":"https:\/\/ptp.cloud\/cisco-asa-remote-code-execution-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ptp.cloud\/"},{"@type":"ListItem","position":2,"name":"Cisco ASA Remote Code Execution and Denial of Service Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/ptp.cloud\/#website","url":"https:\/\/ptp.cloud\/","name":"PTP | Cloud Experts | Biotech Enablers","description":"Helping innovative life sciences companies to get treatments to market faster.","publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ptp.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ptp.cloud\/#organization","name":"Pinnacle Technology Partners","alternateName":"PTP","url":"https:\/\/ptp.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","width":409,"height":181,"caption":"Pinnacle Technology Partners"},"image":{"@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PTPCloud","https:\/\/x.com\/PTPCloud","https:\/\/www.linkedin.com\/company\/pinnacletechpartners","https:\/\/www.youtube.com\/@ptp4766"]},{"@type":"Person","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5","name":"PTPstaff","sameAs":["https:\/\/ptpcloud.mystagingwebsite.com\/ptp"]}]}},"jetpack_featured_media_url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-alert-post-feature.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/2765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/comments?post=2765"}],"version-history":[{"count":3,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/2765\/revisions"}],"predecessor-version":[{"id":17149,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/2765\/revisions\/17149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media\/2768"}],"wp:attachment":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media?parent=2765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/categories?post=2765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/tags?post=2765"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/table_tags?post=2765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}