QID 317277

Date Published: 2022-11-23

QID 317277: Cisco Adaptive Security Appliance (ASA) Software Dynamic Access Policies Denial of Service (DoS) Vulnerability (cisco-sa-asa-ftd-dap-dos-GhYZBxDU)

A vulnerability in dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.

This vulnerability affects Cisco products if they are running a vulnerable release of Cisco ASA Software or Cisco FTD Software and all of the following conditions are true:
Remote access SSL VPN is enabled.
HostScan is enabled.
At least one custom DAP is configured.

Affected Versions
From 9.6.1 Prior to 9.8.4.44
From 9.9.1 Prior to 9.12.4.38
From 9.13.1 Prior to 9.14.3.18
From 9.15.1 Prior to 9.15.1.21
From 9.16.1 Prior to 9.16.2.13
From 9.17.1 Prior to 9.17.1.13

QID Detection Logic (Authenticated):
The check matches Cisco ASA OS version retrieved via Unix Auth using "version" command.

A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 7.8 severity.
  • Solution

    Customers are advised to refer to cisco-sa-asa-ftd-dap-dos-GhYZBxDU#fs for more information.

    CVEs related to QID 317277

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-asa-ftd-dap-dos-GhYZBxDU#fs URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU#fs