First published: Wed Oct 02 2019(Updated: )
The vulnerability is due to the use of an incorrect data type for a length variable. An attacker could exploit this vulnerability by initiating the transfer of a large file to an affected device via SCP. To exploit this vulnerability, the attacker would need to have valid privilege level 15 credentials on the affected device. A successful exploit could allow the attacker to cause the length variable to roll over, which could cause the affected device to crash. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA Software | =9.12<9.12.2.1=9.10<9.10.1.22>=9.7=9.8<=9.9<9.9.2.50>=Earlier than 9.4=9.4=9.5<=9.6<9.6.4.30 | 9.12.2.1 9.10.1.22 9.9.2.50 9.6.4.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20191002-asa-scp-dos is considered high due to the possibility of denial of service attacks.
To fix cisco-sa-20191002-asa-scp-dos, upgrade to the latest fixed versions of Cisco ASA Software as recommended in the advisory.
Affected versions include Cisco ASA Software versions 9.12, 9.10, 9.9, 9.6 up to specified releases.
Yes, an attacker can exploit cisco-sa-20191002-asa-scp-dos remotely if they have valid privileges.
The attack vector for cisco-sa-20191002-asa-scp-dos involves initiating a large file transfer to a vulnerable device via SCP.