First published: Fri Oct 10 2014(Updated: )
The GPRS Tunneling Protocol (GTP) inspection engine in Cisco ASA Software 8.2 before 8.2(5.51), 8.4 before 8.4(7.15), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to cause a denial of service (device reload) via a crafted series of GTP packets, aka Bug ID CSCum56399.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA Software | =8.2.5 | |
Cisco ASA Software | =8.2.5.13 | |
Cisco ASA Software | =8.2.5.22 | |
Cisco ASA Software | =8.2.5.26 | |
Cisco ASA Software | =8.2.5.33 | |
Cisco ASA Software | =8.2.5.41 | |
Cisco ASA Software | =8.2.5.46 | |
Cisco ASA Software | =8.2.5.48 | |
Cisco ASA Software | =8.2.5.49 | |
Cisco ASA Software | =8.4 | |
Cisco ASA Software | =8.4.1 | |
Cisco ASA Software | =8.4.2 | |
Cisco ASA Software | =8.4.3 | |
Cisco ASA Software | =8.4.4 | |
Cisco ASA Software | =8.4.5 | |
Cisco ASA Software | =8.4.6 | |
Cisco ASA Software | =8.4.7 | |
Cisco ASA Software | =8.7 | |
Cisco ASA Software | =9.0 | |
Cisco ASA Software | =9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3386 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2014-3386, upgrade your Cisco ASA Software to a version that is not vulnerable, specifically 8.2(5.51), 8.4(7.15) or higher, 8.7(1.13) or higher, 9.0(4.8) or higher, or 9.1(5.1) or higher.
CVE-2014-3386 affects Cisco ASA Software versions 8.2 before 8.2(5.51), 8.4 before 8.4(7.15), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1).
The impact of CVE-2014-3386 is that remote attackers can exploit it to craft GTP packets, leading to a denial of service and device reload.
There are no specific workarounds for CVE-2014-3386; upgrading to the patched version is the recommended action.