A vulnerability in the TCP proxy functionality for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error in TCP-based packet inspection, which could cause the TCP packet to have an invalid Layer 2 (L2)-formatted header. An attacker could exploit this vulnerability by sending a crafted TCP packet sequence to the targeted device. A successful exploit could allow the attacker to cause a DoS condition.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/108176 | Broken Link Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftdtcp-dos | Vendor Advisory |
http://www.securityfocus.com/bid/108176 | Broken Link Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftdtcp-dos | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
21 Nov 2024, 04:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/108176 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftdtcp-dos - Vendor Advisory |
15 Aug 2023, 15:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* |
Information
Published : 2019-05-03 15:29
Updated : 2024-11-21 04:37
NVD link : CVE-2019-1687
Mitre link : CVE-2019-1687
CVE.ORG link : CVE-2019-1687
JSON object : View
Products Affected
cisco
- asa_5550
- asa_5515-x
- asa_5540
- asa_5555-x
- firepower_threat_defense
- asa_5580
- asa_5520
- asa_5545-x
- asa_5505
- asa_5585-x
- asa_5525-x
- adaptive_security_appliance_software
- asa_5510
- asa_5512-x
CWE
CWE-20
Improper Input Validation