Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-10352

Опубликовано: 14 авг. 2025
Источник: fstec
CVSS3: 8.6
CVSS2: 7.8
EPSS Низкий

Описание

Уязвимость обработчика SSL/TLS микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Cisco Firepower Threat Defense (FTD) связана с повторным освобождением памяти. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании

Вендор

Cisco Systems Inc.

Наименование ПО

Firepower Threat Defense
Adaptive Security Appliance

Версия ПО

6.6.5.2 (Firepower Threat Defense)
9.14.4.6 (Adaptive Security Appliance)
9.14.4.7 (Adaptive Security Appliance)
9.14.4.12 (Adaptive Security Appliance)
6.6.7 (Firepower Threat Defense)
9.12.4.39 (Adaptive Security Appliance)
9.12.4.40 (Adaptive Security Appliance)
9.12.4.41 (Adaptive Security Appliance)
9.12.4.47 (Adaptive Security Appliance)
9.12.4.48 (Adaptive Security Appliance)
9.12.4.50 (Adaptive Security Appliance)
9.12.4.52 (Adaptive Security Appliance)
9.12.4.54 (Adaptive Security Appliance)
9.12.4.55 (Adaptive Security Appliance)
9.12.4.56 (Adaptive Security Appliance)
9.14.4.13 (Adaptive Security Appliance)
9.14.4.14 (Adaptive Security Appliance)
9.14.4.15 (Adaptive Security Appliance)
9.14.4.17 (Adaptive Security Appliance)
9.14.4.22 (Adaptive Security Appliance)
9.14.4.23 (Adaptive Security Appliance)
6.4.0.15 (Firepower Threat Defense)
6.4.0.16 (Firepower Threat Defense)
6.6.7.1 (Firepower Threat Defense)
9.12.4.58 (Adaptive Security Appliance)
9.12.4.62 (Adaptive Security Appliance)
9.12.4.65 (Adaptive Security Appliance)
6.4.0.17 (Firepower Threat Defense)
6.6.7.2 (Firepower Threat Defense)
9.14.4.24 (Adaptive Security Appliance)
9.12.4.67 (Adaptive Security Appliance)
6.4.0.18 (Firepower Threat Defense)

Тип ПО

ПО программно-аппаратного средства
ПО сетевого программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)
Высокий уровень опасности (базовая оценка CVSS 3.1 составляет 8,6)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssltls-dos-eHw76vZe

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 31%
0.00116
Низкий

8.6 High

CVSS3

7.8 High

CVSS2

Связанные уязвимости

CVSS3: 8.6
nvd
6 месяцев назад

A vulnerability in the certificate processing of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper parsing of SSL/TLS certificates. An attacker could exploit this vulnerability by sending crafted DNS packets that match a static Network Address Translation (NAT) rule with DNS inspection enabled through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

CVSS3: 8.6
github
6 месяцев назад

A vulnerability in the certificate processing of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper parsing of SSL/TLS certificates. An attacker could exploit this vulnerability by sending a crafted SSL/TLS certificate to an affected system through a listening SSL/TLS socket. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

EPSS

Процентиль: 31%
0.00116
Низкий

8.6 High

CVSS3

7.8 High

CVSS2