First published: Fri Jan 15 2016(Updated: )
The DCERPC Inspection implementation in Cisco Adaptive Security Appliance (ASA) Software 9.4.1 through 9.5.1 allows remote authenticated users to bypass an intended DCERPC-only ACL by sending arbitrary network traffic, aka Bug ID CSCuu67782.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | =9.4.1 | |
Cisco Adaptive Security Appliance Software | =9.4.1.1 | |
Cisco Adaptive Security Appliance Software | =9.4.1.2 | |
Cisco Adaptive Security Appliance Software | =9.4.1.3 | |
Cisco Adaptive Security Appliance Software | =9.4.1.5 | |
Cisco Adaptive Security Appliance Software | =9.4.2 | |
Cisco Adaptive Security Appliance Software | =9.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6423 has a moderate severity rating due to the potential for remote authenticated users to bypass access control lists.
To mitigate CVE-2015-6423, upgrade to a fixed version of the Cisco Adaptive Security Appliance Software as provided in the security advisory.
CVE-2015-6423 affects Cisco Adaptive Security Appliance Software versions 9.4.1 through 9.5.1.
Yes, CVE-2015-6423 can be exploited remotely by authenticated users to bypass ACLs.
Cisco recommends updating to the latest software versions that include patches for CVE-2015-6423 to ensure security.