Cisco ASA VPN Denial of Service Vulnerability

Related Vulnerabilities: CVE-2013-5544  

A vulnerability in the VPN authentication code that handles parsing of the username from the certificate on the Cisco ASA firewall could allow an unauthenticated, remote attacker to cause a reload of the affected device. The vulnerability is due to parallel processing of a large number of Internet Key Exchange (IKE) requests for which username-from-cert is configured. An attacker could exploit this vulnerability by sending a large number of IKE requests when the affected device is configured with the username-from-cert command. An exploit could allow the attacker to cause a reload of the affected device, leading to a denial of service (DoS) condition. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker must send a large number of IKE requests to a targeted device, which may reside on trusted, internal networks that the attacker would likely need to access. This access requirement decreases the likelihood of a successful exploit. In addition, the targeted device must be configured with the username-from-cert command. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.