CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
65.6%
A vulnerability in the local Certificate Authority (CA) feature
of Cisco ASA Software could allow an unauthenticated, remote attacker to cause a reload of the
affected system.
# Copyright (C) 2016 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
CPE = "cpe:/a:cisco:asa";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.107065");
script_version("2022-02-10T15:02:13+0000");
script_tag(name:"last_modification", value:"2022-02-10 15:02:13 +0000 (Thu, 10 Feb 2022)");
script_tag(name:"creation_date", value:"2016-10-20 13:35:43 +0200 (Thu, 20 Oct 2016)");
script_tag(name:"cvss_base", value:"7.1");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2018-10-30 16:27:00 +0000 (Tue, 30 Oct 2018)");
script_cve_id("CVE-2016-6431");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"VendorFix");
script_name("Cisco ASA Software Local Certificate Authority Denial of Service Vulnerability (cisco-sa-20161019-asa-ca)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2016 Greenbone Networks GmbH");
script_family("CISCO");
script_dependencies("gb_cisco_asa_version.nasl", "gb_cisco_asa_version_snmp.nasl");
script_mandatory_keys("cisco_asa/version");
script_tag(name:"summary", value:"A vulnerability in the local Certificate Authority (CA) feature
of Cisco ASA Software could allow an unauthenticated, remote attacker to cause a reload of the
affected system.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The vulnerability is due to improper handling of crafted
packets during the enrollment operation. An attacker could exploit this vulnerability by sending
a crafted enrollment request to the affected system.
Note: Only HTTPS packets directed to the Cisco ASA interface, where the local CA is allowing user
enrollment, can be used to trigger this vulnerability. This vulnerability affects systems
configured in routed firewall mode and in single or multiple context mode.");
script_tag(name:"impact", value:"An exploit could allow the attacker to cause the reload of the
affected system.");
script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");
script_xref(name:"URL", value:"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-asa-ca");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if( ! version = get_app_version( cpe:CPE, nofork:TRUE ) )
exit( 0 );
check_vers = ereg_replace( pattern:"(\(|\))", string:version, replace:"." );
check_vers = ereg_replace( pattern:"\.$", string:check_vers, replace:"" );
affected = make_list(
'8.0.2.11',
'8.0.2.15',
'8.0.3',
'8.0.3.6',
'8.0.3.12',
'8.0.3.19',
'8.0.4',
'8.0.4.3',
'8.0.4.9',
'8.0.4.16',
'8.0.4.23',
'8.0.4.25',
'8.0.4.28',
'8.0.4.31',
'8.0.4.32',
'8.0.4.33',
'8.0.5',
'8.0.5.20',
'8.0.5.23',
'8.0.5.25',
'8.0.5.27',
'8.0.5.28',
'8.0.5.31',
'8.1.1',
'8.1.1.6',
'8.1.2',
'8.1.2.13',
'8.1.2.15',
'8.1.2.16',
'8.1.2.19',
'8.1.2.23',
'8.1.2.24',
'8.1.2.49',
'8.1.2.50',
'8.1.2.55',
'8.1.0.104',
'8.1.2.56',
'8.2.0.45',
'8.2.1',
'8.2.1.11',
'8.2.2',
'8.2.2.9',
'8.2.2.10',
'8.2.2.12',
'8.2.2.16',
'8.2.2.17',
'8.2.3',
'8.2.4',
'8.2.4.1',
'8.2.4.4',
'8.2.5',
'8.2.5.13',
'8.2.5.22',
'8.2.5.26',
'8.2.5.33',
'8.2.5.40',
'8.2.5.41',
'8.2.5.46',
'8.2.5.48',
'8.2.5.50',
'8.2.5.52',
'8.2.5.55',
'8.2.5.57',
'8.2.5.59',
'8.3.1',
'8.3.1.1',
'8.3.1.4',
'8.3.1.6',
'8.3.2',
'8.3.2.4',
'8.3.2.13',
'8.3.2.23',
'8.3.2.25',
'8.3.2.31',
'8.3.2.33',
'8.3.2.34',
'8.3.2.37',
'8.3.2.39',
'8.3.2.40',
'8.3.2.41',
'8.3.2.44',
'8.4.1',
'8.4.1.3',
'8.4.1.11',
'8.4.2',
'8.4.2.1',
'8.4.2.8',
'8.4.3',
'8.4.3.8',
'8.4.3.9',
'8.4.4',
'8.4.4.1',
'8.4.4.3',
'8.4.4.5',
'8.4.4.9',
'8.4.5',
'8.4.5.6',
'8.4.6',
'8.4.7',
'8.4.7.3',
'8.4.7.15',
'8.4.7.22',
'8.4.7.23',
'8.4.7.26',
'8.4.7.28',
'8.4.0',
'8.4.7.29',
'8.6.1',
'8.6.1.1',
'8.6.1.2',
'8.6.1.5',
'8.6.1.10',
'8.6.1.12',
'8.6.1.13',
'8.6.1.17',
'8.6.1.14',
'9.0.1',
'9.0.2',
'9.0.2.10',
'9.0.3',
'9.0.3.6',
'9.0.3.8',
'9.0.4',
'9.0.4.1',
'9.0.4.5',
'9.0.4.7',
'9.0.4.17',
'9.0.4.20',
'9.0.4.24',
'9.0.4.26',
'9.0.4.29',
'9.0.4.33',
'9.0.4.35',
'9.0.4.37',
'9.0.4.40',
'9.1.1',
'9.1.1.4',
'9.1.2',
'9.1.2.8',
'9.1.3',
'9.1.3.2',
'9.1.4',
'9.1.4.5',
'9.1.5',
'9.1.5.10',
'9.1.5.12',
'9.1.5.15',
'9.1.5.21',
'9.1.6',
'9.1.6.1',
'9.1.6.4',
'9.1.6.6',
'9.1.6.8',
'9.1.6.10',
'9.1.7.4',
'9.1.7.6',
'9.2.1',
'9.2.2',
'9.2.2.4',
'9.2.2.7',
'9.2.2.8',
'9.2.3',
'9.2.3.3',
'9.2.3.4',
'9.2.0.0',
'9.2.0.104',
'9.2.3.1',
'9.2.4',
'9.2.4.2',
'9.2.4.4',
'9.2.4.8',
'9.2.4.10',
'9.3.1',
'9.3.1.1',
'9.3.1.105',
'9.3.1.50',
'9.3.2',
'9.3.2.100',
'9.3.2.2',
'9.3.2.243',
'9.3.3',
'9.3.3.1',
'9.3.3.2',
'9.3.3.5',
'9.3.3.6',
'9.3.3.9',
'9.3.3.10',
'9.4.1',
'9.4.0.115',
'9.4.1.1',
'9.4.1.2',
'9.4.1.3',
'9.4.1.5',
'9.4.2',
'9.4.2.3',
'9.4.3',
'9.4.3.3',
'9.4.3.4',
'9.5.1',
'9.5.2',
'9.5.2.6',
'9.5.2.10',
'9.5.2.14',
'9.6.0',
'9.6.1',
'9.6.1.3' );
foreach af ( affected ) {
if( check_vers == af ) {
report = report_fixed_ver( installed_version:version, fixed_version:"See advisory" );
security_message( port:0, data:report );
exit( 0 );
}
}
exit( 99 );
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
65.6%