// For flags

CVE-2019-1873

Cisco ASA and FTD Software Cryptographic TLS and SSL Driver Denial of Service Vulnerability

Severity Score

8.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability.

"Una vulnerabilidad en el controlador criptográfico de los programas Adaptive Security Appliance (ASA) y Firepower Threat Defense (FTD) de Cisco, podría permitir a un atacante remoto no identificado provocar que el dispositivo se reinicie inesperadamente. La vulnerabilidad es debido a la validación de entrada incompleta de un encabezado de paquete de ingreso de Secure Sockets Layer (SSL) o Transport Layer Security (TLS). Un atacante podría explotar esta vulnerabilidad mediante el envío de un paquete TLS/SSL diseñado a una interfaz en el dispositivo de destino. Un explotación podría permitir al atacante causar que el dispositivo se recargue, lo que resultará en una condición de denegación de servicio (DoS). Nota: solo el tráfico direccionado al sistema afectado puede ser usado para explotar esta vulnerabilidad. Esta vulnerabilidad afecta a los sistemas configurados en el modo de firewall enrutado y transparente y en modo de contexto único o múltiple. Esta vulnerabilidad puede ser activada mediante el tráfico IPv4 e IPv6. Se requiere una sesión válida de SSL o TLS para explotar esta vulnerabilidad.
"

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-07-10 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-11-19 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Asa 5506-x Firmware
Search vendor "Cisco" for product "Asa 5506-x Firmware"
9.6\(4.16\)
Search vendor "Cisco" for product "Asa 5506-x Firmware" and version "9.6\(4.16\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5506-x
Search vendor "Cisco" for product "Asa 5506-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5506-x Firmware
Search vendor "Cisco" for product "Asa 5506-x Firmware"
9.8\(3.8\)
Search vendor "Cisco" for product "Asa 5506-x Firmware" and version "9.8\(3.8\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5506-x
Search vendor "Cisco" for product "Asa 5506-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5506h-x Firmware
Search vendor "Cisco" for product "Asa 5506h-x Firmware"
9.6\(4.16\)
Search vendor "Cisco" for product "Asa 5506h-x Firmware" and version "9.6\(4.16\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5506h-x
Search vendor "Cisco" for product "Asa 5506h-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5506h-x Firmware
Search vendor "Cisco" for product "Asa 5506h-x Firmware"
9.8\(3.8\)
Search vendor "Cisco" for product "Asa 5506h-x Firmware" and version "9.8\(3.8\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5506h-x
Search vendor "Cisco" for product "Asa 5506h-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5506w-x Firmware
Search vendor "Cisco" for product "Asa 5506w-x Firmware"
9.6\(4.16\)
Search vendor "Cisco" for product "Asa 5506w-x Firmware" and version "9.6\(4.16\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5506w-x
Search vendor "Cisco" for product "Asa 5506w-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5506w-x Firmware
Search vendor "Cisco" for product "Asa 5506w-x Firmware"
9.8\(3.8\)
Search vendor "Cisco" for product "Asa 5506w-x Firmware" and version "9.8\(3.8\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5506w-x
Search vendor "Cisco" for product "Asa 5506w-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5508-x Firmware
Search vendor "Cisco" for product "Asa 5508-x Firmware"
9.6\(4.16\)
Search vendor "Cisco" for product "Asa 5508-x Firmware" and version "9.6\(4.16\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5508-x
Search vendor "Cisco" for product "Asa 5508-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5508-x Firmware
Search vendor "Cisco" for product "Asa 5508-x Firmware"
9.8\(3.8\)
Search vendor "Cisco" for product "Asa 5508-x Firmware" and version "9.8\(3.8\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5508-x
Search vendor "Cisco" for product "Asa 5508-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5516-x Firmware
Search vendor "Cisco" for product "Asa 5516-x Firmware"
9.6\(4.16\)
Search vendor "Cisco" for product "Asa 5516-x Firmware" and version "9.6\(4.16\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5516-x
Search vendor "Cisco" for product "Asa 5516-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5516-x Firmware
Search vendor "Cisco" for product "Asa 5516-x Firmware"
9.8\(3.8\)
Search vendor "Cisco" for product "Asa 5516-x Firmware" and version "9.8\(3.8\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5516-x
Search vendor "Cisco" for product "Asa 5516-x"
--
Safe