A vulnerability in the SIP inspection process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a crash and reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to a watchdog timeout and crash during the cleanup of threads that are associated with a SIP connection that is being deleted from the connection list. An attacker could exploit this vulnerability by sending a high rate of crafted SIP traffic through an affected device. A successful exploit could allow the attacker to cause a watchdog timeout and crash, resulting in a crash and reload of the affected device.
2020-10-21T19:15:17.513
2024-11-21T05:31:18.387
Modified
CVSSv3.1: 6.8 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:C
10.0
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | adaptive_security_appliance | < 9.6.4.43 | Yes |
Application | cisco | firepower_threat_defense | ≤ 6.2.2 | Yes |
Application | cisco | firepower_threat_defense | < 6.3.0.6 | Yes |
Application | cisco | firepower_threat_defense | < 6.4.0.10 | Yes |
Application | cisco | firepower_threat_defense | < 6.5.0.5 | Yes |
Application | cisco | firepower_threat_defense | 6.6.0 | Yes |
Operating System | cisco | adaptive_security_appliance_software | < 9.8.4.24 | Yes |
Operating System | cisco | adaptive_security_appliance_software | < 9.9.2.80 | Yes |
Operating System | cisco | adaptive_security_appliance_software | < 9.10.1.43 | Yes |
Operating System | cisco | adaptive_security_appliance_software | < 9.12.4.2 | Yes |
Operating System | cisco | adaptive_security_appliance_software | < 9.13.1.13 | Yes |
Operating System | cisco | adaptive_security_appliance_software | < 9.14.1.19 | Yes |