Lucene search

K
ciscoCiscoCISCO-SA-20151021-ASA-DHCP1
HistoryOct 21, 2015 - 4:00 p.m.

Cisco ASA Software DHCPv6 Relay Denial of Service Vulnerability

2015-10-2116:00:00
tools.cisco.com
13

7.1 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

48.5%

A vulnerability in the DHCPv6 relay feature of Cisco
Adaptive Security Appliance (ASA) software could allow an
unauthenticated, remote attacker to cause an affected
device to reload.

The vulnerability is due to insufficient validation of DHCPv6
packets. Cisco ASA Software is affected by this vulnerability only if the software is configured with the DHCPv6 relay feature. An attacker could exploit this
vulnerability by sending crafted DHCPv6 packets to an
affected device.

Note: Only DHCPv6 packets directed to the Cisco ASA
interface where the DHCPv6 relay is enabled can be used to trigger this
vulnerability. This vulnerability affects
systems configured in routed or transparent firewall mode and in single
or multiple
context mode. This vulnerability can be triggered only by IPv6 traffic.

This vulnerability is documented in Cisco bug IDs CSCus56252[“https://bst.cloudapps.cisco.com/bugsearch/bug/CSCus56252”] (registered[“https://sec.cloudapps.cisco.comRPF/register/register.do”] customers only) and CSCus57142[“https://bst.cloudapps.cisco.com/bugsearch/bug/CSCus57142”] (registered[“https://sec.cloudapps.cisco.comRPF/register/register.do”] customers only) and have been assigned CVE ID
CVE-2015-6324.

Cisco has released software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are not available. This
advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dhcp1[“http://tvce-stg.cisco.com/security/AIMS/https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dhcp1”]

Affected configurations

Vulners
Node
ciscoadaptive_security_appliance_softwareMatch9.0
OR
ciscoadaptive_security_appliance_softwareMatch9.1
OR
ciscoadaptive_security_appliance_softwareMatch9.2
OR
ciscoadaptive_security_appliance_softwareMatch9.3
OR
ciscoadaptive_security_appliance_softwareMatch9.4
OR
ciscoadaptive_security_appliance_softwareMatch9.0.1
OR
ciscoadaptive_security_appliance_softwareMatch9.0.2
OR
ciscoadaptive_security_appliance_softwareMatch9.0.2.10
OR
ciscoadaptive_security_appliance_softwareMatch9.0.3
OR
ciscoadaptive_security_appliance_softwareMatch9.0.3.6
OR
ciscoadaptive_security_appliance_softwareMatch9.0.3.8
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.1
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.5
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.17
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.20
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.24
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.7
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.26
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.29
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.33
OR
ciscoadaptive_security_appliance_softwareMatch9.1.1
OR
ciscoadaptive_security_appliance_softwareMatch9.1.1.4
OR
ciscoadaptive_security_appliance_softwareMatch9.1.2
OR
ciscoadaptive_security_appliance_softwareMatch9.1.3
OR
ciscoadaptive_security_appliance_softwareMatch9.1.2.8
OR
ciscoadaptive_security_appliance_softwareMatch9.1.3.2
OR
ciscoadaptive_security_appliance_softwareMatch9.1.4
OR
ciscoadaptive_security_appliance_softwareMatch9.1.4.5
OR
ciscoadaptive_security_appliance_softwareMatch9.1.5
OR
ciscoadaptive_security_appliance_softwareMatch9.1.5.10
OR
ciscoadaptive_security_appliance_softwareMatch9.1.5.12
OR
ciscoadaptive_security_appliance_softwareMatch9.1.5.15
OR
ciscoadaptive_security_appliance_softwareMatch9.1.6
OR
ciscoadaptive_security_appliance_softwareMatch9.1.5.21
OR
ciscoadaptive_security_appliance_softwareMatch9.1.6.1
OR
ciscoadaptive_security_appliance_softwareMatch9.1.6.4
OR
ciscoadaptive_security_appliance_softwareMatch9.2.1
OR
ciscoadaptive_security_appliance_softwareMatch9.2.2
OR
ciscoadaptive_security_appliance_softwareMatch9.2.2.4
OR
ciscoadaptive_security_appliance_softwareMatch9.2.2.7
OR
ciscoadaptive_security_appliance_softwareMatch9.2.3
OR
ciscoadaptive_security_appliance_softwareMatch9.2.2.8
OR
ciscoadaptive_security_appliance_softwareMatch9.2.3.3
OR
ciscoadaptive_security_appliance_softwareMatch9.2.3.4
OR
ciscoadaptive_security_appliance_softwareMatch9.3.1
OR
ciscoadaptive_security_appliance_softwareMatch9.3.1.1
OR
ciscoadaptive_security_appliance_softwareMatch9.3.2
OR
ciscoadaptive_security_appliance_softwareMatch9.3.2.2
OR
ciscoadaptive_security_appliance_softwareMatch9.3.3
OR
ciscoadaptive_security_appliance_softwareMatch9.4.1
OR
ciscoadaptive_security_appliance_softwareMatch9.4.1.1
OR
ciscoadaptive_security_appliance_softwareMatch9.4.1.5
OR
ciscoadaptive_security_appliance_softwareMatch9.4.1.3
OR
ciscoadaptive_security_appliance_softwareMatch9.4.1.2

7.1 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

48.5%

Related for CISCO-SA-20151021-ASA-DHCP1