Denial of service in Cisco ASA 5500-X Series



Published: 2016-10-06 | Updated: 2018-04-05
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-6424
CWE-ID CWE-399
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cisco ASA 5500-X Series
Hardware solutions / Security hardware applicances

Cisco Adaptive Security Appliance (ASA)
Hardware solutions / Security hardware applicances

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Denial of service

EUVDB-ID: #VU778

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-6424

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote unauthenticated user to cause DoS conditions on the target system.

The weakness exists due to improper resource processing. A specially crafted DHCP packets sent by the attackers at specific rates can trigger the target interface to seize up and stop incoming traffic handling.

Successful exploitation of the vulnerability results in denial of service on the vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Cisco ASA 5500-X Series: 9.1.7.4 - 100.15.0.112

Cisco Adaptive Security Appliance (ASA): 8.4.7.29 - 9.2.4.9

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-asa-dhcp


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###