First published: Thu Aug 20 2015(Updated: )
The Unicast Reverse Path Forwarding (uRPF) implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(1.50), 9.3(2.100), 9.3(3), and 9.4(1) mishandles cases where an IP address belongs to an internal interface but is also in the ASA routing table, which allows remote attackers to bypass uRPF validation via spoofed packets, aka Bug ID CSCuv60724.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | =9.3\(1.50\) | |
Cisco Adaptive Security Appliance Software | =9.3\(2.100\) | |
Cisco Adaptive Security Appliance Software | =9.3\(3\) | |
Cisco Adaptive Security Appliance Software | =9.4\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4321 is classified as a high severity vulnerability that allows unauthorized access to networks.
To address CVE-2015-4321, upgrade your Cisco Adaptive Security Appliance software to the latest version that addresses this vulnerability.
The affected versions for CVE-2015-4321 include Cisco Adaptive Security Appliance Software 9.3(1.50), 9.3(2.100), 9.3(3), and 9.4(1).
CVE-2015-4321 allows remote attackers to bypass security policies by exploiting the uRPF implementation.
There is no official workaround for CVE-2015-4321; upgrading to a patched version is the recommended mitigation.