Multiple vulnerabilities in the Application Layer Protocol Inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerabilities are due to logical errors during traffic inspection. An attacker could exploit these vulnerabilities by sending a high volume of malicious traffic across an affected device. An exploit could allow the attacker to cause a deadlock condition, resulting in a reload of an affected device. These vulnerabilities affect Cisco ASA Software and Cisco FTD Software configured for Application Layer Protocol Inspection running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCve61540, CSCvh23085, CSCvh95456.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103934 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040722 | Broken Link Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01 | Third Party Advisory US Government Resource |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa_inspect | Vendor Advisory |
http://www.securityfocus.com/bid/103934 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040722 | Broken Link Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01 | Third Party Advisory US Government Resource |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa_inspect | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/103934 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040722 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01 - Third Party Advisory, US Government Resource | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa_inspect - Vendor Advisory |
15 Aug 2023, 15:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* |
Information
Published : 2018-04-19 20:29
Updated : 2024-11-21 03:37
NVD link : CVE-2018-0240
Mitre link : CVE-2018-0240
CVE.ORG link : CVE-2018-0240
JSON object : View
Products Affected
cisco
- isa-3000-2c2f
- asa-5585-x
- asa_5506-x
- catalyst_6506-e
- firepower_2120
- firepower_4110
- asa_5555-x
- asa-5555-x
- asa_5516-x
- catalyst_6513-e
- asa-5506-x
- asa_5525-x
- catalyst_6500-e
- asa-5512-x
- firepower_2140
- firepower_4120
- isa-3000-4c
- asa-5520
- firepower_2130
- 7609-s
- adaptive_security_appliance_software
- catalyst_6504-e
- asa-5515-x
- catalyst_6509-v-e
- asa-5545-x
- firepower_threat_defense
- 7613-s
- asa_5580
- catalyst_6513
- firepower_9300
- asa_5506w-x
- asa_5508-x
- firepower_2110
- asa-5506h-x
- 7604
- asa_5550
- catalyst_6509-e
- adaptive_security_virtual_appliance
- asa-5505
- catalyst_6503-e
- firepower_4150
- firepower_4140
- 7606-s
- firepower_threat_defense_virtual
- catalyst_6509-neb-a
- asa_5510
- asa-5540
CWE