A vulnerability in the Secure Copy (SCP) feature of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to the use of an incorrect data type for a length variable. An attacker could exploit this vulnerability by initiating the transfer of a large file to an affected device via SCP. To exploit this vulnerability, the attacker would need to have valid privilege level 15 credentials on the affected device. A successful exploit could allow the attacker to cause the length variable to roll over, which could cause the affected device to crash.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-scp-dos | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
16 Aug 2023, 16:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | |
First Time |
Cisco adaptive Security Appliance Software
|
Information
Published : 2019-10-02 19:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-12693
Mitre link : CVE-2019-12693
CVE.ORG link : CVE-2019-12693
JSON object : View
Products Affected
cisco
- asa_5550
- adaptive_security_appliance
- asa_5515-x
- asa_5555-x
- asa_5580
- asa_5520
- asa_5505
- asa_5585-x
- asa_5525-x
- adaptive_security_appliance_software
- asa_5510
- asa_5512-x