First published: Fri Dec 15 2017(Updated: )
A vulnerability in the TLS protocol implementation of legacy Cisco ASA 5500 Series (ASA 5505, 5510, 5520, 5540, and 5550) devices could allow an unauthenticated, remote attacker to access sensitive information, aka a Return of Bleichenbacher's Oracle Threat (ROBOT) attack. An attacker could iteratively query a server running a vulnerable TLS stack implementation to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions. Cisco Bug IDs: CSCvg97652.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance 5505 Firmware | ||
Cisco Adaptive Security Appliance 5505 | ||
Cisco Adaptive Security Appliance 5510 Firmware | ||
Cisco Adaptive Security Appliance 5510 | ||
Cisco Adaptive Security Appliance 5520 Firmware | ||
Cisco Adaptive Security Appliance 5520 | ||
Cisco Adaptive Security Appliance 5540 Firmware | ||
Cisco Adaptive Security Appliance 5540 | ||
Cisco Adaptive Security Appliance 5550 Firmware | ||
Cisco Adaptive Security Appliance 5550 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco ASA vulnerability is CVE-2017-12373.
The severity of CVE-2017-12373 is medium with a severity value of 5.9.
Cisco ASA 5505, 5510, 5520, 5540, and 5550 devices are affected by CVE-2017-12373.
An attacker can exploit CVE-2017-12373 by performing a Return of Bleichenbacher's Oracle Threat (ROBOT) attack on vulnerable Cisco ASA devices.
Yes, Cisco has released a security advisory with fixes for CVE-2017-12373. Please refer to the Cisco Security Advisory for more information.