Resource exhaustion in Cisco Adaptive Security Appliance (ASA) and Cisco Firewall Threat Defense (FTD) - CVE-2019-1873

 

Resource exhaustion in Cisco Adaptive Security Appliance (ASA) and Cisco Firewall Threat Defense (FTD) - CVE-2019-1873

Published: July 16, 2019 / Updated: July 18, 2019


Vulnerability identifier: #VU19190
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2019-1873
CWE-ID: CWE-400
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Adaptive Security Appliance (ASA)
Cisco Firewall Threat Defense (FTD)

Detailed vulnerability description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. A remote attacker can send a specially crafted TLS/SSL packet to an interface on the targeted device, cause the device to reload and perform a denial of service (DoS) attack.

This vulnerability affects the following products if they are running a vulnerable release of Cisco ASA Software or FTD Software:

  • ASA 5506-X
  • ASA 5506-X with FirePOWER Services
  • ASA 5506H-X
  • ASA 5506H-X with FirePOWER Services
  • ASA 5506W-X
  • ASA 5506W-X with FirePOWER Services
  • ASA 5508-X
  • ASA 5508-X with FirePOWER Services
  • ASA 5516-X
  • ASA 5516-X with FirePOWER Services


How to mitigate CVE-2019-1873

Install updates from vendor's website.

Sources