CISCO-SA-20180418-ASA_INSPECT PUBLISHED CVSS 8.600000381469727 HIGH

Multiple vulnerabilities in the Application Layer Protocol Inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerabilities are due to logical errors during traffic inspection. An attacker could exploit these vulnerabilities by sending a high volume of malicious traffic across an affected device. An exploit could allow the attacker to cause a deadlock condition, resulting in a reload of an affected device. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa_inspect ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa_inspect"]

Risk Scores

CVSS v3.1
8.600000381469727
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Affected Products

VendorProductVersions
9.6.3.3
9.6.3.9
9.6.2.9
9.6.2
9.6.1
9.6.1.10
9.6.2.8
9.6.2.2
9.6.2.3
9.6.1.5
9.6.3
9.6.3.11
9.6.3.8
9.6.2.11
9.6.2.7
9.6.0
9.6.1.3
9.6.3.12
9.6.2.1
9.6.3.1

Timeline

References

Open in Interactive Console →