A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a buffer overflow on an affected system. The vulnerability is due to insufficient boundary checks for specific data that is provided to the web services interface of an affected system. An attacker could exploit this vulnerability by sending a malicious HTTP request. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could disclose data fragments or cause the device to reload, resulting in a denial of service (DoS) condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-memc-dos-fncTyYKG | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Aug 2023, 16:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | |
First Time |
Cisco adaptive Security Appliance Software
|
Information
Published : 2021-04-29 18:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-1493
Mitre link : CVE-2021-1493
CVE.ORG link : CVE-2021-1493
JSON object : View
Products Affected
cisco
- adaptive_security_appliance_software
- firepower_threat_defense
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')