A vulnerability in the remote access SSL VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper validation of errors that are logged as a result of client connections that are made using remote access VPN. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firepower_threat_defense | Cisco | * | 6.4.0.15 (excluding) |
Firepower_threat_defense | Cisco | 6.5.0 (including) | 6.6.5.2 (excluding) |
Firepower_threat_defense | Cisco | 6.7.0 (including) | 7.0.2 (excluding) |
Firepower_threat_defense | Cisco | 7.1.0 (including) | 7.1.0 (including) |
Adaptive_security_appliance_software | Cisco | * | 9.8.4.44 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.9 (including) | 9.12.4.38 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.13 (including) | 9.14.4 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.15 (including) | 9.15.1.21 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.16.0 (including) | 9.16.2.14 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.17.0 (including) | 9.17.1.7 (excluding) |