Lucene search

K
cve[email protected]CVE-2019-15256
HistoryOct 02, 2019 - 7:15 p.m.

CVE-2019-15256

2019-10-0219:15:15
CWE-400
CWE-399
web.nvd.nist.gov
38
cisco asa
ftd software
vulnerability
dos
ikev1
remote attack

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.8%

A vulnerability in the Internet Key Exchange version 1 (IKEv1) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper management of system memory. An attacker could exploit this vulnerability by sending malicious IKEv1 traffic to an affected device. The attacker does not need valid credentials to authenticate the VPN session, nor does the attacker’s source address need to match a peer statement in the crypto map applied to the ingress interface of the affected device. An exploit could allow the attacker to exhaust system memory resources, leading to a reload of an affected device.

Affected configurations

NVD
Node
ciscoadaptive_security_appliance_softwareRange9.79.8.4.10
OR
ciscoadaptive_security_appliance_softwareRange9.99.9.2.47
OR
ciscoadaptive_security_appliance_softwareRange9.109.10.1.30
OR
ciscoadaptive_security_appliance_softwareRange9.129.12.2.5
Node
ciscofirepower_threat_defenseRange6.2.06.2.3.11
OR
ciscofirepower_threat_defenseRange6.3.06.3.0.2
Node
ciscoasa_5505Match-
AND
ciscoasa_5505_firmwareMatch9.9\(2.4\)
OR
ciscoasa_5505_firmwareMatch201.4\(1.21\)
Node
ciscoasa_5510Match-
AND
ciscoasa_5510_firmwareMatch9.9\(2.4\)
OR
ciscoasa_5510_firmwareMatch201.4\(1.21\)
Node
ciscoasa_5512-xMatch-
AND
ciscoasa_5512-x_firmwareMatch9.9\(2.4\)
OR
ciscoasa_5512-x_firmwareMatch201.4\(1.21\)
Node
ciscoasa_5515-xMatch-
AND
ciscoasa_5515-x_firmwareMatch9.9\(2.4\)
OR
ciscoasa_5515-x_firmwareMatch201.4\(1.21\)
Node
ciscoasa_5520Match-
AND
ciscoasa_5520_firmwareMatch9.9\(2.4\)
OR
ciscoasa_5520_firmwareMatch201.4\(1.21\)
Node
ciscoasa_5525-x_firmwareMatch9.9\(2.4\)
OR
ciscoasa_5525-x_firmwareMatch201.4\(1.21\)
AND
ciscoasa_5525-xMatch-
Node
ciscoasa_5540_firmwareMatch9.9\(2.4\)
OR
ciscoasa_5540_firmwareMatch201.4\(1.21\)
AND
ciscoasa_5540Match-
Node
ciscoasa_5545-x_firmwareMatch9.9\(2.4\)
OR
ciscoasa_5545-x_firmwareMatch201.4\(1.21\)
AND
ciscoasa_5545-xMatch-
Node
ciscoasa_5550_firmwareMatch9.9\(2.4\)
OR
ciscoasa_5550_firmwareMatch201.4\(1.21\)
AND
ciscoasa_5550Match-
Node
ciscoasa_5555-x_firmwareMatch9.9\(2.4\)
OR
ciscoasa_5555-x_firmwareMatch201.4\(1.21\)
AND
ciscoasa_5555-xMatch-
Node
ciscoasa_5580_firmwareMatch9.9\(2.4\)
OR
ciscoasa_5580_firmwareMatch201.4\(1.21\)
AND
ciscoasa_5580Match-

CNA Affected

[
  {
    "product": "Cisco Adaptive Security Appliance (ASA) Software ",
    "vendor": "Cisco",
    "versions": [
      {
        "lessThan": "n/a",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.8%