CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
78.1%
Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:
IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability
SQL*Net Inspection Engine Denial of Service Vulnerability
Digital Certificate Authentication Bypass Vulnerability
Remote Access VPN Authentication Bypass Vulnerability
Digital Certificate HTTP Authentication Bypass Vulnerability
HTTP Deep Packet Inspection Denial of Service Vulnerability
DNS Inspection Denial of Service Vulnerability
AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability
SSL VPN Web Portal Denial of Service Vulnerability
Crafted ICMP Packet Denial of Service Vulnerability
These vulnerabilities are independent of one another; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of the IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability, SQL*Net Inspection Engine Denial of Service Vulnerability, HTTP Deep Packet Inspection Denial of Service Vulnerability, DNS Inspection Denial of Service Vulnerability, and SSL VPN Web Portal Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.
Successful exploitation of the Digital Certificate Authentication Bypass Vulnerability, Remote Access VPN Authentication Bypass Vulnerability, and Digital Certificate HTTP Authentication Bypass Vulnerability may result in an authentication bypass, which could allow the attacker access to the inside network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management (ASDM).
Successful exploitation of the AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability may exhaust available memory, which could result in general system instability and cause the affected system to become unresponsive and stop forwarding traffic.
Successful exploitation of the Crafted ICMP Packet Denial of Service Vulnerability may cause valid connections that are passing through the affected system to be dropped, or cause a reload of the system, leading to a denial of service (DoS) condition.
Cisco has released software updates that address these vulnerabilities. Workarounds are available for some of the vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa”]
Note: The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers may be affected by the SQL*Net Inspection Engine Denial of Service Vulnerability. A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the Cisco FWSM. This advisory is available at:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm [" https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm"]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | firewall_services_module | any | cpe:2.3:h:cisco:firewall_services_module:any:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 7.0 | cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 7.1 | cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 7.2 | cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 8.0 | cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 8.2 | cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 8.1 | cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 8.3 | cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 8.4 | cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 8.5 | cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:* |