First published: Wed May 06 2020(Updated: )
A vulnerability in the DHCP module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to incorrect processing of certain DHCP packets. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dos-qk8cTGLz
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA Software | =9.12<9.12.3>=9.9<=9.10<9.10.1.30>=9.7<=9.8<9.8.4.10>=Earlier than 9.5<=9.6<9.6.4.34 | 9.12.3 9.10.1.30 9.8.4.10 9.6.4.34 |
Cisco FTD Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco ASA and FTD vulnerability is cisco-sa-asaftd-dos-qk8cTGLz.
The severity level of cisco-sa-asaftd-dos-qk8cTGLz is medium with a CVSS score of 6.8.
This vulnerability could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device.
This vulnerability affects Cisco ASA Software versions 9.6 up to, but excluding, 9.6.4.34.
There are no specific versions of Cisco FTD Software mentioned as affected by this vulnerability.