CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS
Percentile
88.8%
Cisco Adaptive Security Appliance (ASA) software and Cisco Firepower Threat Defense (FTD) software fails to properly parse SIP traffic, which can result in a denial-of-service condition on affected devices.
Cisco Adaptive Security Appliance (ASA) software and Cisco Firepower Threat Defense (FTD) software fails to properly parse SIP traffic, which can allow an attacker to trigger high CPU usage, resulting in a denial-of-service condition on affected devices. This vulnerability is exposed if SIP Inspection is enabled on affected devices, which is the default configuration on ASA devices. The Cisco SIP Inspection feature is advertised to “… enforce the sanity of the SIP messages, as well as detect SIP-based attacks.”
By causing an affected Cisco device to parse specially-crafted SIP traffic, a remote, unauthenticated attacker may be able to trigger a denial-of-service condition on affected devices.
The CERT/CC is currently unaware of a practical solution to this problem. Please consider the following workarounds:
Disable SIP Inspection
According to the Cisco advisory:
Disabling SIP inspection will completely close the attack vector for this vulnerability. However, it may not be suitable for all customers. In particular, disabling SIP inspection would break SIP connections if either NAT is applied to SIP traffic or if not all ports required for SIP communication are opened via ACL.
To disable SIP inspection, configure the following:
_ Cisco ASA Software and Cisco FTD Software Releases 6.2 and later (in FTD 6.2 and later use Cisco FMC to add the following via FlexConfig policy):_
_ policy-map global_policy_
_ class inspection_default_
_ _``**_no inspect sip_**
_ Cisco FTD Software Releases prior to 6.2:_
**_configure inspection sip disable_**
339704
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: November 01, 2018
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | 7.8 | AV:N/AC:L/Au:N/C:N/I:N/A:C |
Temporal | 7.4 | E:H/RL:W/RC:C |
Environmental | 5.5 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
This vulnerability was publicly reported by Cisco.
This document was written by Will Dormann.
CVE IDs: | CVE-2018-15454 |
---|---|
Date Public: | 2018-10-31 Date First Published: |
en.wikipedia.org/wiki/Session_Initiation_Protocol
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181031-asaftd-sip-dos
www.cisco.com/c/en/us/products/security/adaptive-security-appliance-asa-software/index.html
www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/212420-configure-firepower-threat-defense-ftd.html
www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/inspect-voicevideo.html#ID-2096-00000613
www.cisco.com/c/en/us/td/docs/security/asa/asa99/configuration/firewall/asa-99-firewall-config/inspect-voicevideo.pdf
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS
Percentile
88.8%