CVE-2018-15397
Cisco Adaptive Security Appliance IPsec VPN Denial of Service Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the implementation of Traffic Flow Confidentiality (TFC) over IPsec functionality in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error that may occur if the affected software renegotiates the encryption key for an IPsec tunnel when certain TFC traffic is in flight. An attacker could exploit this vulnerability by sending a malicious stream of TFC traffic through an established IPsec tunnel on an affected device. A successful exploit could allow the attacker to cause a daemon process on the affected device to crash, which could cause the device to crash and result in a DoS condition.
Una vulnerabilidad en la implementación de Traffic Flow Confidentiality (TFC) en la funcionalidad IPsec en Cisco Adaptive Security Appliance (ASA) Software y Cisco Firepower Threat Defense (FTD) Software podría permitir que un atacante remoto no autenticado provoque que un dispositivo afectado se reinicie inesperadamente, lo que resulta en una denegación de servicio (DoS). La vulnerabilidad se debe a un error que podría ocurrir si el software afectado renegocia la clave de cifrado para un túnel IPsec cuando cierto tráfico TFC está en tránsito. Un atacante podría explotar esta vulnerabilidad enviando un flujo de tráfico TFC malicioso a través de un túnel IPsec establecido en un dispositivo afectado. Su explotación con éxito podría permitir que el atacante provoque el cierre inesperado de un proceso demonio en el dispositivo afectado, lo que provocará que el dispositivo se cierre inesperadamente y desemboque en una denegación de servicio (DoS).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-08-17 CVE Reserved
- 2018-10-05 CVE Published
- 2024-08-12 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-320: Key Management Errors
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securitytracker.com/id/1041786 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Firepower Management Center Search vendor "Cisco" for product "Firepower Management Center" | 6.2.2 Search vendor "Cisco" for product "Firepower Management Center" and version "6.2.2" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Adaptive Security Appliance Software Search vendor "Cisco" for product "Adaptive Security Appliance Software" | 9.6.4 Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version "9.6.4" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Adaptive Security Appliance Software Search vendor "Cisco" for product "Adaptive Security Appliance Software" | 9.8.2 Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version "9.8.2" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Adaptive Security Appliance Software Search vendor "Cisco" for product "Adaptive Security Appliance Software" | 9.9.1 Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version "9.9.1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Adaptive Security Appliance Software Search vendor "Cisco" for product "Adaptive Security Appliance Software" | 9.9.1\(1\) Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version "9.9.1\(1\)" | - |
Affected
|