Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-1695


A vulnerability in the detection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to send data directly to the kernel of an affected device. The vulnerability exists because the software improperly filters Ethernet frames sent to an affected device. An attacker could exploit this vulnerability by sending crafted packets to the management interface of an affected device. A successful exploit could allow the attacker to bypass the Layer 2 (L2) filters and send data directly to the kernel of the affected device. A malicious frame successfully delivered would make the target device generate a specific syslog entry.


Published

2019-05-03T15:29:01.103

Last Modified

2024-11-21T04:37:07.167

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

CVSSv2 Vector

AV:A/AC:L/Au:N/C:N/I:C/A:N

  • Access Vector: ADJACENT_NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: COMPLETE
  • Availability Impact: NONE
Exploitability Score

6.5

Impact Score

6.9

Weaknesses
  • Type: Secondary
    CWE-284
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco adaptive_security_appliance_software < 9.8.4 Yes
Application cisco firepower_threat_defense < 6.2.3.12 Yes
Application cisco firepower_threat_defense < 6.3.0.3 Yes
Operating System cisco adaptive_security_appliance_software < 9.9.2.50 Yes
Operating System cisco adaptive_security_appliance_software < 9.10.1.17 Yes
Hardware cisco firepower_2110 - No
Hardware cisco firepower_2120 - No
Hardware cisco firepower_2130 - No
Hardware cisco firepower_2140 - No

References