First published: Wed Jun 04 2008(Updated: )
Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 8.0.x before 8.0(3)9 and 8.1.x before 8.1(1)1 allows remote attackers to cause a denial of service (device reload) via a crafted Transport Layer Security (TLS) packet to the device interface.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | =8.1 | |
Cisco PIX 506E | =8.0 | |
Cisco PIX 506E | =8.1 | |
Cisco Adaptive Security Appliance Software | =8.0 | |
Cisco Adaptive Security Appliance Software | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2056 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2008-2056, it is recommended to upgrade your Cisco ASA or PIX appliances to version 8.0(3)9 or 8.1(1)1 or later.
CVE-2008-2056 affects Cisco Adaptive Security Appliance versions 8.0.x and 8.1.x, as well as Cisco PIX security appliances on similar versions.
Yes, CVE-2008-2056 can be exploited remotely by attackers sending crafted TLS packets.
Exploiting CVE-2008-2056 can lead to a denial of service condition, resulting in the affected device reloading.