A vulnerability in the Open Shortest Path First (OSPF) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent malicious user to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software improperly parses certain options in OSPF link-state advertisement (LSA) type 11 packets. An attacker could exploit this vulnerability by sending a crafted LSA type 11 OSPF packet to an affected device. A successful exploit could allow the malicious user to cause a reload of the affected device, resulting in a DoS condition for client traffic that is traversing the device.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco adaptive_security_appliance |
||
cisco adaptive_security_appliance_software |
||
cisco firepower threat defense |
Switchzilla closes off 18 CVE-listed holes, get to work Hot patches for ColdFusion: Adobe drops trio of fixes for three serious flaws
Cisco has issued an update to address security flaws in three of its networking and security offerings. Switchzilla's latest security bundle includes fixes for 18 CVE-listed vulnerabilities in the firmware for the Adaptive Security Appliance, Firepower Management Center, and Firepower Threat Defense lines. Administrators are advised to test and install the updates as soon as possible. Among the most serious of the vulnerabilities is the pack of eight CVE-listed SQL injection flaws in the Firepow...