The Cavium cryptographic-module firmware on Cisco Adaptive Security Appliance (ASA) devices with software 9.3(3) and 9.4(1.1) does not verify the AES-GCM Integrity Check Value (ICV) octets, which makes it easier for man-in-the-middle attackers to spoof IPSec and IKEv2 traffic by modifying packet data, aka Bug ID CSCuu66218.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/viewAlert.x?alertId=39366 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/75269 - | |
References | () http://www.securitytracker.com/id/1032595 - |
11 Aug 2023, 18:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3\(3\):*:*:*:*:*:*:* |
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4\(1.1\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\(3\):*:*:*:*:*:*:* |
Information
Published : 2015-06-17 10:59
Updated : 2024-11-21 02:31
NVD link : CVE-2015-4550
Mitre link : CVE-2015-4550
CVE.ORG link : CVE-2015-4550
JSON object : View
Products Affected
cisco
- adaptive_security_appliance_software
CWE
CWE-310
Cryptographic Issues