Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-62gc-6823-jqp8

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.6

Описание

A vulnerability in the software cryptography module of the Cisco Adaptive Security Virtual Appliance (ASAv) and Firepower 2100 Series running Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an unexpected reload of the device that results in a denial of service (DoS) condition. The vulnerability is due to a logic error with how the software cryptography module handles IPsec sessions. An attacker could exploit this vulnerability by creating and sending traffic in a high number of IPsec sessions through the targeted device. A successful exploit could cause the device to reload and result in a DoS condition.

A vulnerability in the software cryptography module of the Cisco Adaptive Security Virtual Appliance (ASAv) and Firepower 2100 Series running Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an unexpected reload of the device that results in a denial of service (DoS) condition. The vulnerability is due to a logic error with how the software cryptography module handles IPsec sessions. An attacker could exploit this vulnerability by creating and sending traffic in a high number of IPsec sessions through the targeted device. A successful exploit could cause the device to reload and result in a DoS condition.

EPSS

Процентиль: 64%
0.00459
Низкий

8.6 High

CVSS3

Дефекты

CWE-327
CWE-404

Связанные уязвимости

CVSS3: 8.6
nvd
почти 7 лет назад

A vulnerability in the software cryptography module of the Cisco Adaptive Security Virtual Appliance (ASAv) and Firepower 2100 Series running Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an unexpected reload of the device that results in a denial of service (DoS) condition. The vulnerability is due to a logic error with how the software cryptography module handles IPsec sessions. An attacker could exploit this vulnerability by creating and sending traffic in a high number of IPsec sessions through the targeted device. A successful exploit could cause the device to reload and result in a DoS condition.

CVSS3: 8.6
fstec
почти 7 лет назад

Уязвимость микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance и Cisco Firepower 2100, связанная с некорректной обработкой сеансов IPsec программным криптографическим модулем, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 64%
0.00459
Низкий

8.6 High

CVSS3

Дефекты

CWE-327
CWE-404