Lucene search

K
cve[email protected]CVE-2021-40118
HistoryOct 27, 2021 - 7:15 p.m.

CVE-2021-40118

2021-10-2719:15:08
CWE-787
CWE-121
web.nvd.nist.gov
56
cisco
asa
ftd
software
vulnerability
remote attack
dos
https
nvd
cve-2021-40118

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

57.2%

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

Affected configurations

NVD
Node
ciscoadaptive_security_applianceRange<9.8.4.40
OR
ciscofirepower_threat_defenseRange<6.4.0.13
OR
ciscofirepower_threat_defenseRange6.5.06.6.5
OR
ciscofirepower_threat_defenseRange6.7.06.7.0.3
OR
ciscofirepower_threat_defenseRange7.0.07.0.1
OR
ciscoadaptive_security_appliance_softwareRange9.9.09.12.4.29
OR
ciscoadaptive_security_appliance_softwareRange9.13.09.14.3.9
OR
ciscoadaptive_security_appliance_softwareRange9.15.09.15.1.17
OR
ciscoadaptive_security_appliance_softwareRange9.16.09.16.2.3
Node
ciscoasa_5512-x_firmwareMatch009.012\(004.024\)
OR
ciscoasa_5512-x_firmwareMatch009.015\(001\)
OR
ciscoasa_5512-x_firmwareMatch009.015\(001.015\)
OR
ciscoasa_5512-x_firmwareMatch009.015\(001.016\)
OR
ciscoasa_5512-x_firmwareMatch009.016\(001\)
AND
ciscoasa_5512-xMatch-
Node
ciscoasa_5505_firmwareMatch009.012\(004.024\)
OR
ciscoasa_5505_firmwareMatch009.015\(001\)
OR
ciscoasa_5505_firmwareMatch009.015\(001.015\)
OR
ciscoasa_5505_firmwareMatch009.015\(001.016\)
OR
ciscoasa_5505_firmwareMatch009.016\(001\)
AND
ciscoasa_5505Match-
Node
ciscoasa_5515-x_firmwareMatch009.012\(004.024\)
OR
ciscoasa_5515-x_firmwareMatch009.015\(001\)
OR
ciscoasa_5515-x_firmwareMatch009.015\(001.015\)
OR
ciscoasa_5515-x_firmwareMatch009.015\(001.016\)
OR
ciscoasa_5515-x_firmwareMatch009.016\(001\)
AND
ciscoasa_5515-xMatch-
Node
ciscoasa_5525-x_firmwareMatch009.012\(004.024\)
OR
ciscoasa_5525-x_firmwareMatch009.015\(001\)
OR
ciscoasa_5525-x_firmwareMatch009.015\(001.015\)
OR
ciscoasa_5525-x_firmwareMatch009.015\(001.016\)
OR
ciscoasa_5525-x_firmwareMatch009.016\(001\)
AND
ciscoasa_5525-xMatch-
Node
ciscoasa_5545-x_firmwareMatch009.012\(004.024\)
OR
ciscoasa_5545-x_firmwareMatch009.015\(001\)
OR
ciscoasa_5545-x_firmwareMatch009.015\(001.015\)
OR
ciscoasa_5545-x_firmwareMatch009.015\(001.016\)
OR
ciscoasa_5545-x_firmwareMatch009.016\(001\)
AND
ciscoasa_5545-xMatch-
Node
ciscoasa_5555-x_firmwareMatch009.012\(004.024\)
OR
ciscoasa_5555-x_firmwareMatch009.015\(001\)
OR
ciscoasa_5555-x_firmwareMatch009.015\(001.015\)
OR
ciscoasa_5555-x_firmwareMatch009.015\(001.016\)
OR
ciscoasa_5555-x_firmwareMatch009.016\(001\)
AND
ciscoasa_5555-xMatch-
Node
ciscoasa_5580_firmwareMatch009.012\(004.024\)
OR
ciscoasa_5580_firmwareMatch009.015\(001\)
OR
ciscoasa_5580_firmwareMatch009.015\(001.015\)
OR
ciscoasa_5580_firmwareMatch009.015\(001.016\)
OR
ciscoasa_5580_firmwareMatch009.016\(001\)
AND
ciscoasa_5580Match-
Node
ciscoasa_5585-x_firmwareMatch009.012\(004.024\)
OR
ciscoasa_5585-x_firmwareMatch009.015\(001\)
OR
ciscoasa_5585-x_firmwareMatch009.015\(001.015\)
OR
ciscoasa_5585-x_firmwareMatch009.015\(001.016\)
OR
ciscoasa_5585-x_firmwareMatch009.016\(001\)
AND
ciscoasa_5585-xMatch-

CNA Affected

[
  {
    "product": "Cisco Adaptive Security Appliance (ASA) Software ",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

57.2%

Related for CVE-2021-40118