First published: Thu Jul 15 2021(Updated: )
A vulnerability in the software cryptography module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker or an unauthenticated attacker in a man-in-the-middle position to cause an unexpected reload of the device that results in a denial of service (DoS) condition. The vulnerability is due to a logic error in how the software cryptography module handles specific types of decryption errors. An attacker could exploit this vulnerability by sending malicious packets over an established IPsec connection. A successful exploit could cause the device to crash, forcing it to reload. Important: Successful exploitation of this vulnerability would not cause a compromise of any encrypted data. Note: This vulnerability affects only Cisco ASA Software Release 9.16.1 and Cisco FTD Software Release 7.0.0. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC is rated as high.
To fix cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC, update the affected Cisco Adaptive Security Appliance Software or Cisco Firepower Threat Defense Software to the latest version.
Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software users may be affected by cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC.
cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC can enable a denial-of-service attack by allowing an authenticated or unauthenticated attacker to disrupt services.
Yes, cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC can be exploited remotely by an authenticated attacker or an unauthenticated attacker in a man-in-the-middle position.