First published: Wed May 01 2019(Updated: )
A vulnerability in the remote access VPN session manager of Cisco Adaptive Security Appliance (ASA) Software could allow a unauthenticated, remote attacker to cause a denial of service (DoS) condition on the remote access VPN services. The vulnerability is due to an issue with the remote access VPN session manager. An attacker could exploit this vulnerability by requesting an excessive number of remote access VPN sessions. An exploit could allow the attacker to cause a DoS condition.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | >=9.4<9.4.4.34 | |
Cisco Adaptive Security Appliance Software | >=9.5<9.6.4.25 | |
Cisco Adaptive Security Appliance Software | >=9.7<9.8.4 | |
Cisco Adaptive Security Appliance Software | >=9.9<9.9.2.50 | |
Cisco Adaptive Security Appliance Software | >=9.10<9.10.1.17 | |
Cisco ASA 5506-X | ||
Cisco Asa 5506h-x | ||
Cisco Asa 5506w-x | ||
Cisco Asa 5508-x | ||
Cisco Asa 5516-x | ||
Cisco Asa 5525-x | ||
Cisco Asa 5545-x | ||
Cisco Asa 5555-x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1705 is a vulnerability in the remote access VPN session manager of Cisco Adaptive Security Appliance (ASA) Software.
CVE-2019-1705 could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition on the remote access VPN services of Cisco ASA Software.
CVE-2019-1705 has a severity rating of 5.9 (medium).
Cisco ASA Software versions between 9.4 and 9.4.4.34, between 9.5 and 9.6.4.25, between 9.7 and 9.8.4, between 9.9 and 9.9.2.50, and between 9.10 and 9.10.1.17 are affected by CVE-2019-1705.
Cisco has released software updates to address the vulnerability. It is recommended to update to the latest available version of Cisco ASA Software.