First published: Fri May 03 2019(Updated: )
A vulnerability in the TCP proxy functionality for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error in TCP-based packet inspection, which could cause the TCP packet to have an invalid Layer 2 (L2)-formatted header. An attacker could exploit this vulnerability by sending a crafted TCP packet sequence to the targeted device. A successful exploit could allow the attacker to cause a DoS condition.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | <9.4.4.34 | |
Cisco Adaptive Security Appliance Software | >=9.5<9.6.4.25 | |
Cisco Adaptive Security Appliance Software | >=9.7<9.8.4 | |
Cisco Adaptive Security Appliance Software | >=9.9<9.9.2.50 | |
Cisco Adaptive Security Appliance Software | >=9.10<9.10.1.17 | |
Cisco Asa 5505 | ||
Cisco Asa 5510 | ||
Cisco Asa 5512-x | ||
Cisco Asa 5515-x | ||
Cisco Asa 5520 | ||
Cisco Asa 5525-x | ||
Cisco Asa 5540 | ||
Cisco Asa 5545-x | ||
Cisco Asa 5550 | ||
Cisco Asa 5555-x | ||
Cisco Asa 5580 | ||
Cisco Asa 5585-x | ||
Cisco Firepower Threat Defense | >=6.0.0<6.2.3.12 | |
Cisco Firepower Threat Defense | >=6.3.0<6.3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-1687.
The severity of CVE-2019-1687 is high with a CVSS score of 7.5.
CVE-2019-1687 affects Cisco Adaptive Security Appliance (ASA) Software versions 9.4.4.34 up to but excluding 9.6.4.25, versions 9.7 up to but excluding 9.8.4, versions 9.9 up to but excluding 9.9.2.50, and versions 9.10 up to but excluding 9.10.1.17.
CVE-2019-1687 affects Cisco Firepower Threat Defense (FTD) Software versions 6.0.0 up to but excluding 6.2.3.12, and versions 6.3.0 up to but excluding 6.3.0.3.
To fix CVE-2019-1687, Cisco recommends upgrading to a fixed software release.