CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
EPSS
Percentile
53.2%
Cisco Adaptive Security Appliance (ASA) Software versions for symmetric multi-processor (SMP) platforms contain a vulnerability that could allow an unauthenticated, remote attacker to trigger the device to crash.
The vulnerability is due to the SSL/TLS certificate handling code. An attacker could exploit this vulnerability by generating a heavy SSL/TLS traffic load, which under selected circumstances may trigger the crash.
Cisco has confirmed the vulnerability in a security notice and released software updates.
To exploit this vulnerability, an attacker may require access to trusted, internal networks to generate large amounts of SSL/TLS traffic to be sent to an affected device. This access requirement could limit the likelihood of a successful exploit.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | adaptive_security_appliance_software | 9.0 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.1 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.0.1 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.0.2 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.1.1 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.1.1.4 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.1.2 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:* |