#VU6311 Improper input validation in Cisco Systems, Inc products - CVE-2017-6609 

 

#VU6311 Improper input validation in Cisco Systems, Inc products - CVE-2017-6609

Published: April 19, 2017


Vulnerability identifier: #VU6311
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-6609
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Cisco Adaptive Security Appliance (ASA)
Cisco ASA 1000V Cloud Firewall
Cisco ASA 5500
Cisco ASA 5500-X Series
Cisco 7600 Series ASA Services Module
Cisco Firepower 9300 ASA Security Module
Cisco ISA 3000 Industrial Security Appliance
Cisco Adaptive Security Virtual Appliance (ASAv)
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to cause denial of service vulnerability.

The vulnerability exists due to improper parsing of malformed IPsec packets. A remote authenticated attacker can send specially crafted IPsec packets to the affected system and perform a denial of service (DoS) attack. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. An attacker needs to establish a valid IPsec tunnel before exploiting this vulnerability.


Remediation

Install updates from vendor's website:

Prior to 9.0
Affected, migrate to 9.1(7.8) or later
9.0
Affected, migrate to 9.1(7.8) or later
9.1  9.1(7.8) or later
9.2
9.2(4.15) or later
9.3
Affected, migrate to 9.4(4) or later
9.4  9.4(4) or later
9.5
9.5(3.2) or later
9.6 9.6(2) or later

External links