Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-00025

Опубликовано: 02 нояб. 2022
Источник: fstec
CVSS3: 8.6
CVSS2: 7.8
EPSS Низкий

Описание

Уязвимость реализации функции динамического контроля доступа (DAP) микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Cisco Firepower Threat Defense (FTD) связана с выходом операции за границы буфера в памяти. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании

Вендор

Cisco Systems Inc.

Наименование ПО

Adaptive Security Appliance
Firepower Threat Defense

Версия ПО

9.6.2 (Adaptive Security Appliance)
6.2.1 (Firepower Threat Defense)
до 9.8.2.26 (Adaptive Security Appliance)
7.0.0 (Firepower Threat Defense)
от 6.7.0 до 6.7.0.3 включительно (Firepower Threat Defense)
от 6.5.0 до 6.5.0.5 включительно (Firepower Threat Defense)
6.6.0 (Firepower Threat Defense)
6.6.0.1 (Firepower Threat Defense)
6.6.1 (Firepower Threat Defense)
6.6.3 (Firepower Threat Defense)
6.6.4 (Firepower Threat Defense)
6.6.5 (Firepower Threat Defense)
6.6.5.1 (Firepower Threat Defense)
от 6.2.3 до 6.2.3.18 включительно (Firepower Threat Defense)
от 6.3.0 до 6.3.0.5 включительно (Firepower Threat Defense)
от 6.4.0 до 6.4.0.14 включительно (Firepower Threat Defense)
7.0.0.1 (Firepower Threat Defense)
7.0.1 (Firepower Threat Defense)
7.0.1.1 (Firepower Threat Defense)
от 7.1.0 до 7.1.0.2 включительно (Firepower Threat Defense)
от 6.1.0 до 6.1.0.7 включительно (Firepower Threat Defense)
от 6.2.0 до 6.2.0.6 включительно (Firepower Threat Defense)
от 6.2.2 до 6.2.2.5 включительно (Firepower Threat Defense)
7.1.0.1 (Firepower Threat Defense)
9.6.1 (Adaptive Security Appliance)
9.6.1.3 (Adaptive Security Appliance)
9.6.1.5 (Adaptive Security Appliance)
9.6.1.10 (Adaptive Security Appliance)
9.6.2.1 (Adaptive Security Appliance)
9.6.2.3 (Adaptive Security Appliance)
9.6.2.7 (Adaptive Security Appliance)
9.6.2.11 (Adaptive Security Appliance)
9.6.2.13 (Adaptive Security Appliance)
9.6.2.22 (Adaptive Security Appliance)
9.6.2.23 (Adaptive Security Appliance)
9.6.3 (Adaptive Security Appliance)
9.6.3.8 (Adaptive Security Appliance)
9.6.3.9 (Adaptive Security Appliance)
9.6.3.11 (Adaptive Security Appliance)
9.6.3.12 (Adaptive Security Appliance)
9.6.3.14 (Adaptive Security Appliance)
9.6.3.17 (Adaptive Security Appliance)
9.6.3.20 (Adaptive Security Appliance)
9.6.4 (Adaptive Security Appliance)
9.6.4.3 (Adaptive Security Appliance)
9.6.4.5 (Adaptive Security Appliance)
9.6.4.6 (Adaptive Security Appliance)
9.6.4.8 (Adaptive Security Appliance)
9.6.4.10 (Adaptive Security Appliance)
9.6.4.12 (Adaptive Security Appliance)
9.6.4.14 (Adaptive Security Appliance)
9.6.4.17 (Adaptive Security Appliance)
9.6.4.18 (Adaptive Security Appliance)
9.6.4.20 (Adaptive Security Appliance)
9.6.4.22 (Adaptive Security Appliance)
9.6.4.23 (Adaptive Security Appliance)
9.6.4.24 (Adaptive Security Appliance)
9.6.4.25 (Adaptive Security Appliance)
9.6.4.29 (Adaptive Security Appliance)
9.6.4.30 (Adaptive Security Appliance)
9.6.4.34 (Adaptive Security Appliance)
9.6.4.36 (Adaptive Security Appliance)
9.6.4.40 (Adaptive Security Appliance)
9.6.4.41 (Adaptive Security Appliance)
9.6.4.42 (Adaptive Security Appliance)
9.6.4.45 (Adaptive Security Appliance)
9.7.1 (Adaptive Security Appliance)
9.7.1.2 (Adaptive Security Appliance)
9.7.1.4 (Adaptive Security Appliance)
9.7.1.8 (Adaptive Security Appliance)
9.7.1.15 (Adaptive Security Appliance)
9.7.1.16 (Adaptive Security Appliance)
9.7.1.21 (Adaptive Security Appliance)
9.7.1.24 (Adaptive Security Appliance)
9.8.1 (Adaptive Security Appliance)
9.8.1.5 (Adaptive Security Appliance)
9.8.1.7 (Adaptive Security Appliance)
9.8.2 (Adaptive Security Appliance)
9.8.2.8 (Adaptive Security Appliance)
9.8.2.14 (Adaptive Security Appliance)
9.8.2.15 (Adaptive Security Appliance)
9.8.2.17 (Adaptive Security Appliance)
9.8.2.20 (Adaptive Security Appliance)
9.8.2.24 (Adaptive Security Appliance)
9.8.2.26 (Adaptive Security Appliance)
9.8.2.28 (Adaptive Security Appliance)
9.8.2.33 (Adaptive Security Appliance)
9.8.2.35 (Adaptive Security Appliance)
9.8.2.38 (Adaptive Security Appliance)
9.8.3 (Adaptive Security Appliance)
9.8.3.8 (Adaptive Security Appliance)
9.8.3.11 (Adaptive Security Appliance)
9.8.3.14 (Adaptive Security Appliance)
9.8.3.16 (Adaptive Security Appliance)
9.8.3.18 (Adaptive Security Appliance)
9.8.3.21 (Adaptive Security Appliance)
9.8.3.26 (Adaptive Security Appliance)
9.8.3.29 (Adaptive Security Appliance)
9.8.4 (Adaptive Security Appliance)
9.8.4.3 (Adaptive Security Appliance)
9.8.4.7 (Adaptive Security Appliance)
9.8.4.8 (Adaptive Security Appliance)
9.8.4.10 (Adaptive Security Appliance)
9.8.4.12 (Adaptive Security Appliance)
9.8.4.15 (Adaptive Security Appliance)
9.8.4.17 (Adaptive Security Appliance)

Тип ПО

ПО сетевого программно-аппаратного средства
ПО программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,6)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 73%
0.00792
Низкий

8.6 High

CVSS3

7.8 High

CVSS2

Связанные уязвимости

CVSS3: 8.6
nvd
около 3 лет назад

A vulnerability in dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to improper processing of HostScan data received from the Posture (HostScan) module. An attacker could exploit this vulnerability by sending crafted HostScan data to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU"] This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication.

CVSS3: 7.5
github
около 3 лет назад

A vulnerability in dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to improper processing of HostScan data received from the Posture (HostScan) module. An attacker could exploit this vulnerability by sending crafted HostScan data to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU"] This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication.

EPSS

Процентиль: 73%
0.00792
Низкий

8.6 High

CVSS3

7.8 High

CVSS2