First published: Wed Mar 09 2016(Updated: )
The HTTPS inspection engine in the Content Security and Control Security Services Module (CSC-SSM) 6.6 before 6.6.1164.0 for Cisco ASA 5500 devices allows remote attackers to cause a denial of service (memory consumption or device reload) via a flood of HTTPS packets, aka Bug ID CSCue76147.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA 5500 CSC-SSM firmware | =6.6.1125.0 | |
Cisco ASA 5500 CSC-SSM firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1312 is classified as a medium severity vulnerability due to its potential for denial of service attacks.
To fix CVE-2016-1312, upgrade your Cisco ASA 5500 CSC-SSM firmware to version 6.6.1164.0 or later.
CVE-2016-1312 enables remote attackers to cause a denial of service through a flood of HTTPS packets.
CVE-2016-1312 affects Cisco ASA 5500 devices running vulnerable versions of the Content Security and Control Security Services Module.
Exploiting CVE-2016-1312 can lead to memory consumption and device reloads, impacting network availability.