Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2019-02723

Опубликовано: 10 июл. 2019
Источник: fstec
CVSS3: 8.6
CVSS2: 7.8
EPSS Низкий

Описание

Уязвимость микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance Software (ASA) и Cisco Firepower Threat Defense (FTD) связана с неполной проверкой входных данных заголовка протоколов Secure Sockets Layer (SSL) и Transport Layer Security (TLS). Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать перезагрузку устройства или вызвать отказ в обслуживании с помощью специально сформированных TLS/SSL пакетов

Вендор

Cisco Systems Inc.

Наименование ПО

Firepower Threat Defense
Adaptive Security Appliance

Версия ПО

6.1.0 (Firepower Threat Defense)
6.2.0 (Firepower Threat Defense)
6.2.1 (Firepower Threat Defense)
6.2.2 (Firepower Threat Defense)
9.5 (Adaptive Security Appliance)
9.6 (Adaptive Security Appliance)
9.7 (Adaptive Security Appliance)
9.8 (Adaptive Security Appliance)
6.0 (Firepower Threat Defense)
9.9 (Adaptive Security Appliance)
6.2.3 (Firepower Threat Defense)
6.0.1 (Firepower Threat Defense)
9.10 (Adaptive Security Appliance)
6.3.0 (Firepower Threat Defense)
6.4.0 (Firepower Threat Defense)
до 9.4 включительно (Adaptive Security Appliance)
9.12 (Adaptive Security Appliance)

Тип ПО

ПО программно-аппаратного средства
ПО сетевого программно-аппаратного средства

Операционные системы и аппаратные платформы

Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,6)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190710-asa-ftd-dos

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 67%
0.00543
Низкий

8.6 High

CVSS3

7.8 High

CVSS2

Связанные уязвимости

CVSS3: 8.6
nvd
больше 6 лет назад

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability.

github
больше 3 лет назад

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability.

EPSS

Процентиль: 67%
0.00543
Низкий

8.6 High

CVSS3

7.8 High

CVSS2