First published: Fri Feb 19 2010(Updated: )
The Cisco Firewall Services Module (FWSM) 4.0 before 4.0(8), as used in for the Cisco Catalyst 6500 switches, Cisco 7600 routers, and ASA 5500 Adaptive Security Appliances, allows remote attackers to cause a denial of service (crash) via a malformed Skinny Client Control Protocol (SCCP) message.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firewall Services Module Software | =4.0 | |
Cisco Firewall Services Module Software | =4.0\(4\) | |
Cisco Firewall Services Module Software | =4.0\(6\) | |
Cisco Adaptive Security Appliance 5500 | ||
Cisco Adaptive Security Appliance 5505 | ||
Cisco Adaptive Security Appliance 5510 Firmware | ||
Cisco Adaptive Security Appliance 5520 | ||
Cisco Adaptive Security Appliance 5540 Firmware | ||
Cisco Adaptive Security Appliance 5550 | ||
Cisco 5580 series Adaptive Security Appliance | ||
Cisco ASA 5500 CSC-SSM | ||
Cisco Catalyst 6500-E | ||
Cisco Catalyst 7600 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0151 has a severity rating that indicates it is capable of causing a denial of service.
To mitigate CVE-2010-0151, upgrade the Cisco Firewall Services Module to a version that is not vulnerable, specifically to 4.0(8) or later.
CVE-2010-0151 affects Cisco Firewall Services Module versions prior to 4.0(8) running on specific Cisco hardware.
CVE-2010-0151 allows remote attackers to exploit a malformed SCCP message to crash the affected Cisco devices.
There are no specific workarounds for CVE-2010-0151; updating to the recommended version is the main mitigation method.