4
CVSSv2

CVE-2019-12677

Published: 02/10/2019 Updated: 16/08/2023
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote malicious user to cause a denial of service (DoS) condition that prevents the creation of new SSL/Transport Layer Security (TLS) connections to an affected device. The vulnerability is due to incorrect handling of Base64-encoded strings. An attacker could exploit this vulnerability by opening many SSL VPN sessions to an affected device. The attacker would need to have valid user credentials on the affected device to exploit this vulnerability. A successful exploit could allow the malicious user to overwrite a special system memory location, which will eventually result in memory allocation errors for new SSL/TLS sessions to the device, preventing successful establishment of these sessions. A reload of the device is required to recover from this condition. Established SSL/TLS connections to the device and SSL/TLS connections through the device are not affected. Note: Although this vulnerability is in the SSL VPN feature, successful exploitation of this vulnerability would affect all new SSL/TLS sessions to the device, including management sessions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco adaptive_security_appliance_software

Vendor Advisories

A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition that prevents the creation of new SSL/Transport Layer Security (TLS) connections to an affected device The vulnerability is due to incorrect han ...

Recent Articles

Life's certainties: Death, taxes, and Cisco patching more serious vulnerabilities
The Register • Shaun Nichols in San Francisco • 04 Oct 2019

Switchzilla closes off 18 CVE-listed holes, get to work Hot patches for ColdFusion: Adobe drops trio of fixes for three serious flaws

Cisco has issued an update to address security flaws in three of its networking and security offerings. Switchzilla's latest security bundle includes fixes for 18 CVE-listed vulnerabilities in the firmware for the Adaptive Security Appliance, Firepower Management Center, and Firepower Threat Defense lines. Administrators are advised to test and install the updates as soon as possible. Among the most serious of the vulnerabilities is the pack of eight CVE-listed SQL injection flaws in the Firepow...