Improper input validation in Cisco Adaptive Security Appliance (ASA) - CVE-2015-6327
Published: October 21, 2015 / Updated: February 9, 2017
Cisco Adaptive Security Appliance (ASA)
Detailed vulnerability description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within implementation of Internet Key Exchange (IKE) protocol version 1 (v1). A remote unauthenticated attacker can send specially crafted Internet Security Association and Key Management Protocol (ISAKMP) UDP packets to the affected device and cause system reboot.
Successful exploitation of the vulnerability may allow an attacker to perform a denial of service (DoS) attack.
How to mitigate CVE-2015-6327
Cisco ASA 7.2 - migrate to 8.2(5.58) or later
Cisco ASA 8.2 - update to 8.2(5.58) or later
Cisco ASA 8.3 - migrate to 8.4(7.29) or later
Cisco ASA 8.4 - update to 8.4(7.29)
Cisco ASA 8.5 - migrate to 9.0(4.37) or later
Cisco ASA 8.6 - migrate to 9.0(4.37) or later
Cisco ASA 8.7 - update to 8.7(1.17)
Cisco ASA 9.0 - update to 9.0(4.37)
Cisco ASA 9.1 - update to 9.1(6.8)
Cisco ASA 9.2 - update to 9.2(4)
Cisco ASA 9.3 - update to 9.3(3)