// For flags

CVE-2021-40125

Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IKEv2 Site-to-Site VPN Denial of Service Vulnerability

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. This vulnerability is due to improper control of a resource. An attacker with the ability to spoof a trusted IKEv2 site-to-site VPN peer and in possession of valid IKEv2 credentials for that peer could exploit this vulnerability by sending malformed, authenticated IKEv2 messages to an affected device. A successful exploit could allow the attacker to trigger a reload of the device.

Una vulnerabilidad en la implementación del Intercambio de Claves de Internet Versión 2 (IKEv2) del software Cisco Adaptive Security Appliance (ASA) y del software Cisco Firepower Threat Defense (FTD) podría permitir a un atacante remoto autenticado desencadenar una condición de denegación de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad es debido a un control inapropiado de un recurso. Un atacante con la capacidad de falsificar un peer IKEv2 site-to-site VPN confiable y en posesión de credenciales IKEv2 válidas para ese peer podría explotar esta vulnerabilidad mediante el envío de mensajes IKEv2 malformados y autenticados a un dispositivo afectado. Una explotación con éxito podría permitir al atacante desencadenar una recarga del dispositivo

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-08-25 CVE Reserved
  • 2021-10-27 CVE Published
  • 2023-05-20 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
  • CWE-416: Use After Free
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Asa 5512-x Firmware
Search vendor "Cisco" for product "Asa 5512-x Firmware"
009.016\(001.025\)
Search vendor "Cisco" for product "Asa 5512-x Firmware" and version "009.016\(001.025\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5512-x
Search vendor "Cisco" for product "Asa 5512-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5505 Firmware
Search vendor "Cisco" for product "Asa 5505 Firmware"
009.016\(001.025\)
Search vendor "Cisco" for product "Asa 5505 Firmware" and version "009.016\(001.025\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5505
Search vendor "Cisco" for product "Asa 5505"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5515-x Firmware
Search vendor "Cisco" for product "Asa 5515-x Firmware"
009.016\(001.025\)
Search vendor "Cisco" for product "Asa 5515-x Firmware" and version "009.016\(001.025\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5515-x
Search vendor "Cisco" for product "Asa 5515-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5525-x Firmware
Search vendor "Cisco" for product "Asa 5525-x Firmware"
009.016\(001.025\)
Search vendor "Cisco" for product "Asa 5525-x Firmware" and version "009.016\(001.025\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5525-x
Search vendor "Cisco" for product "Asa 5525-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5545-x Firmware
Search vendor "Cisco" for product "Asa 5545-x Firmware"
009.016\(001.025\)
Search vendor "Cisco" for product "Asa 5545-x Firmware" and version "009.016\(001.025\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5545-x
Search vendor "Cisco" for product "Asa 5545-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5555-x Firmware
Search vendor "Cisco" for product "Asa 5555-x Firmware"
009.016\(001.025\)
Search vendor "Cisco" for product "Asa 5555-x Firmware" and version "009.016\(001.025\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5555-x
Search vendor "Cisco" for product "Asa 5555-x"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5580 Firmware
Search vendor "Cisco" for product "Asa 5580 Firmware"
009.016\(001.025\)
Search vendor "Cisco" for product "Asa 5580 Firmware" and version "009.016\(001.025\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5580
Search vendor "Cisco" for product "Asa 5580"
--
Safe
Cisco
Search vendor "Cisco"
Asa 5585-x Firmware
Search vendor "Cisco" for product "Asa 5585-x Firmware"
009.016\(001.025\)
Search vendor "Cisco" for product "Asa 5585-x Firmware" and version "009.016\(001.025\)"
-
Affected
in Cisco
Search vendor "Cisco"
Asa 5585-x
Search vendor "Cisco" for product "Asa 5585-x"
--
Safe
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
< 6.4.0.13
Search vendor "Cisco" for product "Firepower Threat Defense" and version " < 6.4.0.13"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
>= 6.6.0 < 6.6.5
Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.6.0 < 6.6.5"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
>= 6.7.0 < 6.7.0.3
Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.7.0 < 6.7.0.3"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
>= 7.0.0 < 7.0.1
Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 7.0.0 < 7.0.1"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.8.0 < 9.8.4.40
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.8.0 < 9.8.4.40"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.9.0 < 9.12.4.30
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.9.0 < 9.12.4.30"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.14.0 < 9.14.3.9
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.14.0 < 9.14.3.9"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.15.0 < 9.15.1.17
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.15.0 < 9.15.1.17"
-
Affected
Cisco
Search vendor "Cisco"
Adaptive Security Appliance Software
Search vendor "Cisco" for product "Adaptive Security Appliance Software"
>= 9.16.0 < 9.16.2
Search vendor "Cisco" for product "Adaptive Security Appliance Software" and version " >= 9.16.0 < 9.16.2"
-
Affected