CVE-2019-1873
Cisco ASA and FTD Software Cryptographic TLS and SSL Driver Denial of Service Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability.
"Una vulnerabilidad en el controlador criptográfico de los programas Adaptive Security Appliance (ASA) y Firepower Threat Defense (FTD) de Cisco, podría permitir a un atacante remoto no identificado provocar que el dispositivo se reinicie inesperadamente. La vulnerabilidad es debido a la validación de entrada incompleta de un encabezado de paquete de ingreso de Secure Sockets Layer (SSL) o Transport Layer Security (TLS). Un atacante podría explotar esta vulnerabilidad mediante el envío de un paquete TLS/SSL diseñado a una interfaz en el dispositivo de destino. Un explotación podría permitir al atacante causar que el dispositivo se recargue, lo que resultará en una condición de denegación de servicio (DoS). Nota: solo el tráfico direccionado al sistema afectado puede ser usado para explotar esta vulnerabilidad. Esta vulnerabilidad afecta a los sistemas configurados en el modo de firewall enrutado y transparente y en modo de contexto único o múltiple. Esta vulnerabilidad puede ser activada mediante el tráfico IPv4 e IPv6. Se requiere una sesión válida de SSL o TLS para explotar esta vulnerabilidad.
"
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2018-12-06 CVE Reserved
- 2019-07-10 CVE Published
- 2023-03-07 EPSS Updated
- 2024-11-19 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/109123 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Asa 5506-x Firmware Search vendor "Cisco" for product "Asa 5506-x Firmware" | 9.6\(4.16\) Search vendor "Cisco" for product "Asa 5506-x Firmware" and version "9.6\(4.16\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5506-x Search vendor "Cisco" for product "Asa 5506-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5506-x Firmware Search vendor "Cisco" for product "Asa 5506-x Firmware" | 9.8\(3.8\) Search vendor "Cisco" for product "Asa 5506-x Firmware" and version "9.8\(3.8\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5506-x Search vendor "Cisco" for product "Asa 5506-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5506h-x Firmware Search vendor "Cisco" for product "Asa 5506h-x Firmware" | 9.6\(4.16\) Search vendor "Cisco" for product "Asa 5506h-x Firmware" and version "9.6\(4.16\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5506h-x Search vendor "Cisco" for product "Asa 5506h-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5506h-x Firmware Search vendor "Cisco" for product "Asa 5506h-x Firmware" | 9.8\(3.8\) Search vendor "Cisco" for product "Asa 5506h-x Firmware" and version "9.8\(3.8\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5506h-x Search vendor "Cisco" for product "Asa 5506h-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5506w-x Firmware Search vendor "Cisco" for product "Asa 5506w-x Firmware" | 9.6\(4.16\) Search vendor "Cisco" for product "Asa 5506w-x Firmware" and version "9.6\(4.16\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5506w-x Search vendor "Cisco" for product "Asa 5506w-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5506w-x Firmware Search vendor "Cisco" for product "Asa 5506w-x Firmware" | 9.8\(3.8\) Search vendor "Cisco" for product "Asa 5506w-x Firmware" and version "9.8\(3.8\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5506w-x Search vendor "Cisco" for product "Asa 5506w-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5508-x Firmware Search vendor "Cisco" for product "Asa 5508-x Firmware" | 9.6\(4.16\) Search vendor "Cisco" for product "Asa 5508-x Firmware" and version "9.6\(4.16\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5508-x Search vendor "Cisco" for product "Asa 5508-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5508-x Firmware Search vendor "Cisco" for product "Asa 5508-x Firmware" | 9.8\(3.8\) Search vendor "Cisco" for product "Asa 5508-x Firmware" and version "9.8\(3.8\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5508-x Search vendor "Cisco" for product "Asa 5508-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5516-x Firmware Search vendor "Cisco" for product "Asa 5516-x Firmware" | 9.6\(4.16\) Search vendor "Cisco" for product "Asa 5516-x Firmware" and version "9.6\(4.16\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5516-x Search vendor "Cisco" for product "Asa 5516-x" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Asa 5516-x Firmware Search vendor "Cisco" for product "Asa 5516-x Firmware" | 9.8\(3.8\) Search vendor "Cisco" for product "Asa 5516-x Firmware" and version "9.8\(3.8\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asa 5516-x Search vendor "Cisco" for product "Asa 5516-x" | - | - |
Safe
|