First published: Wed Oct 21 2020(Updated: )
A vulnerability in the SSL/TLS session handler of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory leak when closing SSL/TLS connections in a specific state. An attacker could exploit this vulnerability by establishing several SSL/TLS sessions and ensuring they are closed under certain conditions. A successful exploit could allow the attacker to exhaust memory resources in the affected device, which would prevent it from processing new SSL/TLS connections, resulting in a DoS. Manual intervention is required to recover an affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance | <9.6 | |
Cisco Firepower Threat Defense | <6.3.0.6 | |
Cisco Firepower Threat Defense | >=6.4.0<6.4.0.10 | |
Cisco Firepower Threat Defense | >=6.5.0<6.6.1 | |
Cisco Adaptive Security Appliance Software | >=9.8.0<9.8.4.26 | |
Cisco Adaptive Security Appliance Software | >=9.9.0<9.9.2.80 | |
Cisco Adaptive Security Appliance Software | >=9.10.0<9.10.1.44 | |
Cisco Adaptive Security Appliance Software | >=9.12.0<9.12.4.4 | |
Cisco Adaptive Security Appliance Software | >=9.13.0<9.13.1.13 | |
Cisco Adaptive Security Appliance Software | >=9.14.0<9.14.1.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.