First published: Wed May 01 2019(Updated: )
A vulnerability in the detection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to send data directly to the kernel of an affected device. The vulnerability exists because the software improperly filters Ethernet frames sent to an affected device. An attacker could exploit this vulnerability by sending crafted packets to the management interface of an affected device. A successful exploit could allow the attacker to bypass the Layer 2 (L2) filters and send data directly to the kernel of the affected device. A malicious frame successfully delivered would make the target device generate a specific syslog entry. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-bypass
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA Software | =9.10<9.10.1.17>=9.8<=9.9<9.9.2.50 | 9.10.1.17 9.9.2.50 |
Cisco FTD Software | =6.2.3<6.2.3.12=6.2.2<6.2.3.12=6.2.1<6.2.3.12 | 6.2.3.12 6.2.3.12 6.2.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190501-asa-ftd-bypass is high due to its potential impact on network security.
To fix cisco-sa-20190501-asa-ftd-bypass, upgrade to the updated versions of Cisco ASA Software or Cisco FTD Software provided by Cisco.
Cisco ASA Software versions 9.8 to 9.10.1.17 and Cisco FTD Software versions 6.2.1 to 6.2.3.12 are affected by cisco-sa-20190501-asa-ftd-bypass.
The attacker in cisco-sa-20190501-asa-ftd-bypass is an unauthenticated, adjacent attacker.
An attacker can send data directly to the kernel of the affected device, potentially leading to further exploitation.