QID 317085

Date Published: 2021-10-28

QID 317085: Cisco Adaptive Security Appliance Software (ASA) Software-Based Secure Sockets Layer/Transport Layer Security (SSL/TLS) Denial of Service (DoS) Vulnerability (cisco-sa-ftd-tls-decrypt-dos-BMxYjm8M)

A vulnerability in the software-based SSL/TLS message handler of Cisco Adaptive Security Appliance (ASA) Software could allow
an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.

Affected Products
Cisco devices if they are running the following Cisco software releases under the following conditions:
ASA Software: Vulnerable versions 9.16.1 and 9.16.1.28
If affected devices are configured to process inbound SSL/TLS message, they are vulnerable to crafted SSL/TLS message that are sent to the device.

QID Detection Logic (Authenticated):
The check matches Cisco ASA OS version retrieved via Unix Auth using "version" command.

A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 7.8 severity.
  • Solution

    Customers are advised to refer to cisco-sa-ftd-tls-decrypt-dos-BMxYjm8M for more information.

    CVEs related to QID 317085

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-ftd-tls-decrypt-dos-BMxYjm8M URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-decrypt-dos-BMxYjm8M