QID 317277
Date Published: 2022-11-23
QID 317277: Cisco Adaptive Security Appliance (ASA) Software Dynamic Access Policies Denial of Service (DoS) Vulnerability (cisco-sa-asa-ftd-dap-dos-GhYZBxDU)
A vulnerability in dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.
This vulnerability affects Cisco products if they are running a vulnerable release of Cisco ASA Software or Cisco FTD Software and all of the following conditions are true:
Remote access SSL VPN is enabled.
HostScan is enabled.
At least one custom DAP is configured.
Affected Versions
From 9.6.1 Prior to 9.8.4.44
From 9.9.1 Prior to 9.12.4.38
From 9.13.1 Prior to 9.14.3.18
From 9.15.1 Prior to 9.15.1.21
From 9.16.1 Prior to 9.16.2.13
From 9.17.1 Prior to 9.17.1.13
QID Detection Logic (Authenticated):
The check matches Cisco ASA OS version retrieved via Unix Auth using "version" command.
A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
Customers are advised to refer to cisco-sa-asa-ftd-dap-dos-GhYZBxDU#fs for more information.
- cisco-sa-asa-ftd-dap-dos-GhYZBxDU -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU
CVEs related to QID 317277
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-asa-ftd-dap-dos-GhYZBxDU#fs |
|