Actively Exploited High Impact DoS Vulnerability Found in Cisco ASA and FTD
#1
Quote:Cisco just disclosed an actively exploited denial of service (DoS) vulnerability in the Session Initiation Protocol (SIP) inspection engine of their Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) Software.

The security issue could allow potential remote and unauthenticated attackers to "cause an affected device to reload or trigger high CPU, resulting in a denial of service (DoS) condition."

As detailed by Cisco in their advisory, the security issue lies in the way Session Initiation Protocol traffic is improperly handled, making it possible for an adversary to send maliciously crafted SIP requests designed to trigger this specific vulnerability at high rates across affected devices.
This DoS vulnerability (CVE-2018-15454) affects Cisco ASA Software Release 9.4 and later and Cisco FTD Software Release 6.0 and later according to Cisco, if SIP inspection is enabled.

Source: https://news.softpedia.com/news/high-imp...3546.shtml
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Webroot SecureAnywhere 9.0.44.46
Webroot SecureAnyw...harlan4096 — 07:57
Free Download Manager 6.34.0.6878
Changes in 6.34.0....harlan4096 — 07:56
Kaspersky\VPN\KSOS 21.26 (MR26) & KES 1...
harlan4096 — 07:54
VMware Workstation Pro 26H1
VMware Workstation...harlan4096 — 07:53
Opera 131.0.5877.55
Hello! New upda...harlan4096 — 07:51

[-]
Birthdays
Today's Birthdays
avatar (45)mediumog
Upcoming Birthdays
avatar (28)akiratoriyama
avatar (48)Jerrycix
avatar (40)awedoli
avatar (82)WinRARHowTo
avatar (39)axuben
avatar (40)ihijudu
avatar (49)contjrat
avatar (50)Mirzojap
avatar (36)idilysaju
avatar (40)GregoryRog
avatar (40)odukoromu
avatar (46)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>