#VU10328 Double-free error in Cisco Systems, Inc products - CVE-2018-0101
Published: January 29, 2018 / Updated: June 17, 2021
Vulnerability identifier: #VU10328
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Red
CVE-ID: CVE-2018-0101
CWE-ID: CWE-415
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
Cisco Adaptive Security Appliance (ASA)
Cisco ASA 5500
Cisco ASA 5500-X Series
Cisco Catalyst 6500 Series ASA Services Module
Cisco 7600 Series ASA Services Module
Cisco ASA 1000V Cloud Firewall
Cisco Firepower 9300 Security Appliance
Cisco Adaptive Security Virtual Appliance (ASAv)
Firepower 2100 Series Security Appliance
Firepower 4110 Security Appliance
3000 Series Industrial Security Appliance (ISA)
Adaptive Security Appliance (ASA) CX
Cisco Adaptive Security Appliance (ASA)
Cisco ASA 5500
Cisco ASA 5500-X Series
Cisco Catalyst 6500 Series ASA Services Module
Cisco 7600 Series ASA Services Module
Cisco ASA 1000V Cloud Firewall
Cisco Firepower 9300 Security Appliance
Cisco Adaptive Security Virtual Appliance (ASAv)
Firepower 2100 Series Security Appliance
Firepower 4110 Security Appliance
3000 Series Industrial Security Appliance (ISA)
Adaptive Security Appliance (ASA) CX
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a double-free error when parsing XML packets on webvpn-configured interface. A remote unauthenticated attacker can send a series of specially crafted XML packets to webvpn-enable device, trigger double-free error and corrupt memory.
Successful exploitation of the vulnerability may allow an attacker to cause denial of service condition or execute arbitrary code on the target system.
Note: according to Cisco, the vulnerability was publicly disclosed prior to vendor notification. There are known exploitation attempts of this vulnerability in the wild.
The following products are affected:
The vulnerability exists due to a double-free error when parsing XML packets on webvpn-configured interface. A remote unauthenticated attacker can send a series of specially crafted XML packets to webvpn-enable device, trigger double-free error and corrupt memory.
Successful exploitation of the vulnerability may allow an attacker to cause denial of service condition or execute arbitrary code on the target system.
Note: according to Cisco, the vulnerability was publicly disclosed prior to vendor notification. There are known exploitation attempts of this vulnerability in the wild.
The following products are affected:
- 3000 Series Industrial Security Appliance (ISA)
- ASA 5500 Series Adaptive Security Appliances
- ASA 5500-X Series Next-Generation Firewalls
- ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
- ASA 1000V Cloud Firewall
- Adaptive Security Virtual Appliance (ASAv)
- Firepower 2100 Series Security Appliance
- Firepower 4110 Security Appliance
- Firepower 4120 Security Appliance
- Firepower 4140 Security Appliance
- Firepower 4150 Security Appliance
- Firepower 9300 ASA Security Module
- Firepower Threat Defense Software (FTD)
- FTD Virtual
Remediation
Install updates from vendor's website.
Vendor has released new patched on February 5.
Vendor has released new patched on February 5.