First published: Sun Oct 13 2013(Updated: )
The IPsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(1.7), when an IPsec VPN tunnel is enabled, allows remote attackers to cause a denial of service (device reload) via a (1) ICMP or (2) ICMPv6 packet that is improperly handled during decryption, aka Bug ID CSCue18975.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | =9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5507 has been classified as a high severity vulnerability due to its potential to cause a denial of service.
CVE-2013-5507 can be exploited by sending specially crafted ICMP or ICMPv6 packets to the Cisco Adaptive Security Appliance.
CVE-2013-5507 affects Cisco Adaptive Security Appliance Software version 9.1 before 9.1(1.7).
To fix CVE-2013-5507, upgrade your Cisco Adaptive Security Appliance Software to version 9.1(1.7) or later.
If an upgrade is not feasible, consider implementing additional network security measures to filter malicious ICMP or ICMPv6 traffic.