First published: Wed Apr 27 2022(Updated: )
A vulnerability in an IPsec VPN library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to read or modify data within an IPsec IKEv2 VPN tunnel. This vulnerability is due to an improper implementation of Galois/Counter Mode (GCM) ciphers. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a sufficient number of encrypted messages across an affected IPsec IKEv2 VPN tunnel and then using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to decrypt, read, modify, and re-encrypt data that is transmitted across an affected IPsec IKEv2 VPN tunnel. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ipsec-mitm-CKnLr4 This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA Software | =9.16<9.16.2.7=9.15<9.15.1.21>=9.13<=9.14<9.14.3.13=9.12<9.12.4.37 | 9.16.2.7 9.15.1.21 9.14.3.13 9.12.4.37 |
Cisco FTD Software | >=6.5.0=6.6.0<=6.7.0<Cisco_FTD_Hotfix_AA-6.7.0.4-2.sh.REL.tarCisco_FTD_SSP_FP1K_Hotfix_AA-6.7.0.4-2.sh.REL.tarCisco_FTD_SSP_FP2K_Hotfix_AA-6.7.0.4-2.sh.REL.tarCisco_FTD_SSP_Hotfix_AA-6.7.0.4-2.sh.REL.tar=6.4.0<6.4.0.13 | Cisco_FTD_Hotfix_AA-6.7.0.4-2.sh.REL.tarCisco_FTD_SSP_FP1K_Hotfix_AA-6.7.0.4-2.sh.REL.tarCisco_FTD_SSP_FP2K_Hotfix_AA-6.7.0.4-2.sh.REL.tarCisco_FTD_SSP_Hotfix_AA-6.7.0.4-2.sh.REL.tar 6.4.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco ASA and FTD IPsec vulnerability is cisco-sa-asaftd-ipsec-mitm-CKnLr4.
The severity of vulnerability cisco-sa-asaftd-ipsec-mitm-CKnLr4 is high with a severity score of 7.4.
The affected software versions for vulnerability cisco-sa-asaftd-ipsec-mitm-CKnLr4 are Cisco ASA Software versions 9.12.4.37 to 9.16.2.7, and Cisco FTD Software versions 6.4.0 to 6.7.0.
An unauthenticated, remote attacker can exploit this vulnerability by reading or modifying data within an IPsec IKEv2 VPN tunnel.
For Cisco ASA Software, upgrade to versions 9.16.2.7, 9.15.1.21, 9.14.3.13, or 9.12.4.37. For Cisco FTD Software, apply Hotfix AA-6.7.0.4-2.sh.REL.tar or upgrade to versions 6.4.0.13 or later.