First published: Wed Oct 27 2021(Updated: )
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. These vulnerabilities are due to improper input validation when parsing HTTPS requests. An attacker could exploit these vulnerabilities by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asafdt-webvpn-dos-KSqJAKPA This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2021 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Credit: CVE-2021-1573 was found during internal security testing. Nikita Abramov Positive Technologies for reporting CVERuslan Sayfiev Ierae Security for reporting CVEDenis Faiustov Ierae Security for reporting CVE Ierae Security for reporting CVEMasahiro Kawada Ierae Security for reporting CVE
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA | =9.16<9.16.1.28=9.15<9.15.1.17>=9.13<=9.14<9.14.3>=9.9=9.10<=9.12<9.12.4.26>=9.7 and earlier<=9.8<9.8.4.40 | 9.16.1.28 9.15.1.17 9.14.3 9.12.4.26 9.8.4.40 |
Cisco FTD Major | >=6.5.0=6.6.0<=6.7.0<6.7.0.3 (Jan 2022)>=6.2.2 and earlier=6.2.3=6.3.0<=6.4.0<6.4.0.13 (Nov 2021) | 6.7.0.3 (Jan 2022) 6.4.0.13 (Nov 2021) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of cisco-sa-asafdt-webvpn-dos-KSqJAKPA is critical as it allows unauthenticated attackers to trigger a denial of service condition.
To fix cisco-sa-asafdt-webvpn-dos-KSqJAKPA, upgrade to the latest recommended software versions for Cisco ASA and FTD.
Cisco ASA Major and Cisco FTD Major products are affected by cisco-sa-asafdt-webvpn-dos-KSqJAKPA.
Yes, an attacker can exploit cisco-sa-asafdt-webvpn-dos-KSqJAKPA remotely without authentication.
Versions 9.16, 9.15, 9.14, 9.12, and 9.8 for Cisco ASA and versions up to 6.7.0 for Cisco FTD are impacted by cisco-sa-asafdt-webvpn-dos-KSqJAKPA.