Cisco Adaptive Security Appliance Software 9.8.3.18

CPE Details

Cisco Adaptive Security Appliance Software 9.8.3.18
9.8.3.18
2019-07-03
13h04 +00:00
2023-08-15
13h21 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:cisco:adaptive_security_appliance_software:9.8.3.18:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

adaptive_security_appliance_software

Version

9.8.3.18

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-15256 2019-10-02 19h06 +00:00 A vulnerability in the Internet Key Exchange version 1 (IKEv1) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper management of system memory. An attacker could exploit this vulnerability by sending malicious IKEv1 traffic to an affected device. The attacker does not need valid credentials to authenticate the VPN session, nor does the attacker's source address need to match a peer statement in the crypto map applied to the ingress interface of the affected device. An exploit could allow the attacker to exhaust system memory resources, leading to a reload of an affected device.
8.6
High
CVE-2019-1695 2019-05-03 15h10 +00:00 A vulnerability in the detection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to send data directly to the kernel of an affected device. The vulnerability exists because the software improperly filters Ethernet frames sent to an affected device. An attacker could exploit this vulnerability by sending crafted packets to the management interface of an affected device. A successful exploit could allow the attacker to bypass the Layer 2 (L2) filters and send data directly to the kernel of the affected device. A malicious frame successfully delivered would make the target device generate a specific syslog entry.
6.5
Medium