Improper input validation in Cisco Systems, Inc products - CVE-2017-6609

 

Improper input validation in Cisco Systems, Inc products - CVE-2017-6609

Published: April 19, 2017


Vulnerability identifier: #VU6311
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-6609
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Adaptive Security Appliance (ASA)
Cisco ASA 1000V Cloud Firewall
Cisco ASA 5500
Cisco ASA 5500-X Series
Cisco 7600 Series ASA Services Module
Cisco Firepower 9300 ASA Security Module
Cisco ISA 3000 Industrial Security Appliance
Cisco Adaptive Security Virtual Appliance (ASAv)

Detailed vulnerability description

The vulnerability allows a remote attacker to cause denial of service vulnerability.

The vulnerability exists due to improper parsing of malformed IPsec packets. A remote authenticated attacker can send specially crafted IPsec packets to the affected system and perform a denial of service (DoS) attack. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. An attacker needs to establish a valid IPsec tunnel before exploiting this vulnerability.


How to mitigate CVE-2017-6609

Install updates from vendor's website:

Prior to 9.0
Affected, migrate to 9.1(7.8) or later
9.0
Affected, migrate to 9.1(7.8) or later
9.1  9.1(7.8) or later
9.2
9.2(4.15) or later
9.3
Affected, migrate to 9.4(4) or later
9.4  9.4(4) or later
9.5
9.5(3.2) or later
9.6 9.6(2) or later

Sources