First published: Wed May 06 2020(Updated: )
Multiple vulnerabilities in the Media Gateway Control Protocol (MGCP) inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerabilities are due to inefficient memory management. An attacker could exploit these vulnerabilities by sending crafted MGCP packets through an affected device. An exploit could allow the attacker to cause memory exhaustion resulting in a restart of an affected device, causing a DoS condition for traffic traversing the device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | >=6.2.3<6.2.3.16 | |
Cisco Firepower Threat Defense | >=6.3.0<6.3.0.6 | |
Cisco Firepower Threat Defense | >=6.4.0<6.4.0.4 | |
Cisco Asa 5505 Firmware | =9.10\(1.3\) | |
Cisco Asa 5505 | ||
Cisco Asa 5510 Firmware | =9.10\(1.3\) | |
Cisco Asa 5510 | ||
Cisco Asa 5512-x Firmware | =9.10\(1.3\) | |
Cisco Asa 5512-x | ||
Cisco Asa 5515-x Firmware | =9.10\(1.3\) | |
Cisco Asa 5515-x | ||
Cisco Asa 5520 Firmware | =9.10\(1.3\) | |
Cisco Asa 5520 | ||
Cisco Asa 5525-x Firmware | =9.10\(1.3\) | |
Cisco Asa 5525-x | ||
Cisco Asa 5540 Firmware | =9.10\(1.3\) | |
Cisco Asa 5540 | ||
Cisco Asa 5545-x Firmware | =9.10\(1.3\) | |
Cisco Asa 5545-x | ||
Cisco Asa 5550 Firmware | =9.10\(1.3\) | |
Cisco Asa 5550 | ||
Cisco Asa 5555-x Firmware | =9.10\(1.3\) | |
Cisco Asa 5555-x | ||
Cisco Asa 5580 Firmware | =9.10\(1.3\) | |
Cisco Asa 5580 | ||
Cisco Asa 5585-x Firmware | =9.10\(1.3\) | |
Cisco Asa 5585-x | ||
Cisco Adaptive Security Appliance Software | >=9.6<9.6.4.34 | |
Cisco Adaptive Security Appliance Software | >=9.8<9.8.4.7 | |
Cisco Adaptive Security Appliance Software | >=9.9<9.9.2.66 | |
Cisco Adaptive Security Appliance Software | >=9.10<9.10.1.27 | |
Cisco Adaptive Security Appliance Software | >=9.12<9.12.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.