Lucene search

K
ciscoCiscoCISCO-SA-20140219-FWSM
HistoryFeb 19, 2014 - 4:00 p.m.

Cisco Firewall Services Module Cut-Through Proxy Denial of Service Vulnerability

2014-02-1916:00:00
tools.cisco.com
14

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.002 Low

EPSS

Percentile

56.2%

Cisco Firewall Services Module (FWSM) Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected system.

The vulnerability is due to a race condition when releasing the memory allocated by the cut-through proxy function. An attacker could exploit this vulnerability by sending traffic to match the condition that triggers cut-through proxy authentication.

Cisco has released software updates that address this vulnerability. Workarounds that mitigate the vulnerability are not available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm[β€œhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm”]

Affected configurations

Vulners
Node
ciscofirewall_services_moduleMatchany
OR
ciscofirewall_services_moduleMatchany

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.002 Low

EPSS

Percentile

56.2%

Related for CISCO-SA-20140219-FWSM