#VU6311 Improper input validation in Cisco Systems, Inc products - CVE-2017-6609
Published: April 19, 2017
Vulnerability identifier: #VU6311
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-6609
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Cisco Adaptive Security Appliance (ASA)
Cisco ASA 1000V Cloud Firewall
Cisco ASA 5500
Cisco ASA 5500-X Series
Cisco 7600 Series ASA Services Module
Cisco Firepower 9300 ASA Security Module
Cisco ISA 3000 Industrial Security Appliance
Cisco Adaptive Security Virtual Appliance (ASAv)
Cisco Adaptive Security Appliance (ASA)
Cisco ASA 1000V Cloud Firewall
Cisco ASA 5500
Cisco ASA 5500-X Series
Cisco 7600 Series ASA Services Module
Cisco Firepower 9300 ASA Security Module
Cisco ISA 3000 Industrial Security Appliance
Cisco Adaptive Security Virtual Appliance (ASAv)
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to cause denial of service vulnerability.
The vulnerability exists due to improper parsing of malformed IPsec packets. A remote authenticated attacker can send specially crafted IPsec packets to the affected system and perform a denial of service (DoS) attack. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. An attacker needs to establish a valid IPsec tunnel before exploiting this vulnerability.
Remediation
Install updates from vendor's website:
|
Prior to 9.0 |
Affected, migrate to 9.1(7.8) or later |
|
9.0 |
Affected, migrate to 9.1(7.8) or later |
| 9.1 |
9.1(7.8) or later |
|
9.2 |
9.2(4.15) or later |
|
9.3 |
Affected, migrate to 9.4(4) or later |
| 9.4 |
9.4(4) or later |
|
9.5 |
9.5(3.2) or later |
| 9.6 | 9.6(2) or later |