The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 prior to 9.1(6), 9.2 prior to 9.2(3.3), and 9.3 prior to 9.3(3) does not properly validate failover communication messages, which allows remote malicious users to reconfigure an ASA device, and consequently obtain administrative control, by sending crafted UDP packets over the local network to the failover interface, aka Bug ID CSCur21069.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco adaptive security appliance software 9.3.2 |
||
cisco adaptive security appliance software 9.1.1.4 |
||
cisco adaptive security appliance software 9.1.4 |
||
cisco adaptive security appliance software 9.2.2.7 |
||
cisco adaptive security appliance software 9.1.5.21 |
||
cisco adaptive security appliance software 9.1.3 |
||
cisco adaptive security appliance software 9.1.2 |
||
cisco adaptive security appliance software 9.2.3 |
||
cisco adaptive security appliance software 9.3.1.1 |
||
cisco adaptive security appliance software 9.1.1 |
||
cisco adaptive security appliance software 9.1.4.5 |
||
cisco adaptive security appliance software 9.1.5 |
||
cisco adaptive security appliance software 9.2.1 |
||
cisco adaptive security appliance software 9.2.2 |
||
cisco adaptive security appliance software 9.2.2.4 |
||
cisco adaptive security appliance software 9.1.3.2 |
||
cisco adaptive security appliance software 9.1.5.10 |
||
cisco adaptive security appliance software 9.1.5.12 |
||
cisco adaptive security appliance software 9.3.2.2 |
||
cisco adaptive security appliance software 9.1.2.8 |
||
cisco adaptive security appliance software 9.3.1 |
||
cisco adaptive security appliance software 9.1.5.15 |
||
cisco adaptive security appliance software 9.2.2.8 |