-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2019.3698.3
         Cisco Adaptive Security Appliance Software and Firepower
                          Threat Defense Software
                              21 October 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software
Publisher:         Cisco Systems
Operating System:  Network Appliance
Impact/Access:     Denial of Service    -- Remote/Unauthenticated      
                   Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-15256 CVE-2019-12698 CVE-2019-12695
                   CVE-2019-12693 CVE-2019-12678 CVE-2019-12677
                   CVE-2019-12676 CVE-2019-12673 

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ssl-vpn-dos
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-scp-dos
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-dos
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ftd-ikev1-dos
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ospf-lsa-dos
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ftd-sip-dos
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ftd-dos
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-xss

Comment: This bulletin contains eight (10) Cisco Systems security advisories.

Revision History:  October 21 2019: Vendor updated associated Cisco bulletins (cisco-sa-20191002-asa-dos and cisco-sa-20191002-asa-ospf-lsa-dos)
                   October  8 2019: Updated cisco-sa-20191002-asa-scp-dos to v1.1
                   October  3 2019: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Adaptive Security Appliance Software SSL VPN Denial of Service
Vulnerability

Priority:        High

Advisory ID:     cisco-sa-20191002-asa-ssl-vpn-dos

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCux45179

CVE-2019-12677   

CWE-172

CVSS Score:
7.7  AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X

Summary

  o A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco
    Adaptive Security Appliance (ASA) Software could allow an authenticated,
    remote attacker to cause a denial of service (DoS) condition that prevents
    the creation of new SSL/Transport Layer Security (TLS) connections to an
    affected device.

    The vulnerability is due to incorrect handling of Base64-encoded strings.
    An attacker could exploit this vulnerability by opening many SSL VPN
    sessions to an affected device. The attacker would need to have valid user
    credentials on the affected device to exploit this vulnerability. A
    successful exploit could allow the attacker to overwrite a special system
    memory location, which will eventually result in memory allocation errors
    for new SSL/TLS sessions to the device, preventing successful establishment
    of these sessions. A reload of the device is required to recover from this
    condition. Established SSL/TLS connections to the device and SSL/TLS
    connections through the device are not affected.

    Note: Although this vulnerability is in the SSL VPN feature, successful
    exploitation of this vulnerability would affect all new SSL/TLS sessions to
    the device, including management sessions.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ssl-vpn-dos

    This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication, which includes 10 Cisco Security
    Advisories that describe 18 vulnerabilities. For a complete list of the
    advisories and links to them, see Cisco Event Response: October 2019 Cisco
    ASA, FMC, and FTD Software Security Advisory Bundled Publication .

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco products that are running a vulnerable
    release of Cisco ASA Software and that have either the Clientless SSL VPN
    or AnyConnect SSL VPN enabled.

    For information about which Cisco ASA Software releases are vulnerable, see
    the Fixed Software section of this advisory.

    Determine Whether an SSL VPN Is Configured

    Administrators can use the show running-config webvpn command to determine
    whether the Clientless SSL VPN or AnyConnect SSL VPN is enabled. The
    following example shows the output of the command for a device that has the
    Clientless SSL VPN or AnyConnect SSL VPN enabled:

        ciscoasa# show running-config webvpn
        webvpn
        .
        .
        .
         enable <interface_name>
        .
        .
        .

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect Cisco Firepower
    Management Center (FMC) Software or Cisco Firepower Threat Defense (FTD)
    Software.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    In the following tables, the left column lists releases of Cisco ASA
    Software, Cisco FMC Software, or Cisco FTD Software. The center column
    indicates whether a release is affected by the vulnerability described in
    this advisory and the first release that includes the fix for this
    vulnerability. The right column indicates whether a release is affected by
    any of the vulnerabilities described in this bundle and which release
    includes fixes for those vulnerabilities.

    Cisco ASA Software

      Cisco ASA   First Fixed Release        First Fixed Release for All
      Software          for This       Vulnerabilities Described in the Bundle
       Release       Vulnerability                  of Advisories
    Earlier than  Migrate to a fixed   Migrate to a fixed release.
    9.1 ^1        release.
    9.1 ^1        9.1.7.4              Migrate to a fixed release.
    9.2 ^1        9.2.4.8              Migrate to a fixed release.
    9.3 ^1        9.3.3.9              Migrate to a fixed release.
    9.4 ^1        9.4.2.11             Migrate to a fixed release.
    9.5 ^1        9.5.2.5              Migrate to a fixed release.
    9.6           9.6.2                9.6.4.34
    9.7 ^1        Not vulnerable.      Migrate to a fixed release.
    9.8           Not vulnerable.      9.8.4.10
    9.9           Not vulnerable.      Migrate to a fixed release.
    9.10          Not vulnerable.      9.10.1.30
    9.12          Not vulnerable.      9.12.2.5
    9.13          Not vulnerable.      Not vulnerable.

    1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7,
    have reached end of software maintenance. Customers are advised to migrate
    to a supported release that includes the fix for this vulnerability.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during the resolution of a Cisco TAC support
    case.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ssl-vpn-dos

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================

Cisco Adaptive Security Appliance Software Secure Copy Denial of Service
Vulnerability

Priority:        Medium

Advisory ID:     cisco-sa-20191002-asa-scp-dos

First Published: 2019 October 2 16:00 GMT

Last Updated:    2019 October 7 15:13 GMT

Version 1.1:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvo51265

CVE-2019-12693   

CWE-704

CVSS Score:
6.8  AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X

Summary

  o A vulnerability in the Secure Copy (SCP) feature of Cisco Adaptive Security
    Appliance (ASA) Software could allow an authenticated, remote attacker to
    cause a denial of service (DoS) condition.

    The vulnerability is due to the use of an incorrect data type for a length
    variable. An attacker could exploit this vulnerability by initiating the
    transfer of a large file to an affected device via SCP. To exploit this
    vulnerability, the attacker would need to have valid privilege level 15
    credentials on the affected device. A successful exploit could allow the
    attacker to cause the length variable to roll over, which could cause the
    affected device to crash.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-scp-dos

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco products that are running any release of
    Cisco ASA Software and that have the SCP feature enabled. The SCP feature
    is not enabled in Cisco ASA Software by default.

    For information about which Cisco ASA Software releases are vulnerable, see
    the Fixed Software section of this advisory.

    Determine Whether Secure Copy Is Configured

    Administrators can use the show running-config ssh command to determine
    whether SCP is enabled. The following example shows the output of the
    command for a device that has the SCP feature enabled and that allows
    access to the SCP feature from the 10.10.10.0/24 network via the Management
    interface:

        ciscoasa# show running-config ssh

        ssh scopy enable
        ssh 10.10.10.0 255.255.255.0 Management

    Note: The device is vulnerable to requests only when they are sent from an
    IP address in the range configured in the ssh <remote_ip_address>
    <remote_subnet_mask> <interface_name> command.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect Cisco Firepower
    Threat Defense (FTD) Software or Cisco Firepower Management Center (FMC)
    Software.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    In the following table(s), the left column lists releases of Cisco ASA
    Software, Cisco FMC Software, or Cisco FTD Software. The right column
    indicates whether a release is affected by the vulnerability described in
    this advisory and the first release that includes the fix for this
    vulnerability.

    Cisco ASA Software

     Cisco ASA Software Release    First Fixed Release for This Vulnerability
    Earlier than 9.4 ^1          Migrate to a fixed release.
    9.4 ^1                       Migrate to a fixed release.
    9.5 ^1                       Migrate to a fixed release.
    9.6                          9.6.4.30
    9.7 ^1                       Migrate to a fixed release.
    9.8                          9.8.4
    9.9                          9.9.2.50
    9.10                         9.10.1.22
    9.12                         9.12.2.1
    9.13                         Not vulnerable.

    1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7,
    have reached end of software maintenance. Customers are advised to migrate
    to a supported release that includes the fix for this vulnerability.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during the resolution of a Cisco TAC support
    case.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-scp-dos

Revision History

  o +---------+-------------------------+----------+--------+-----------------+
    | Version |       Description       | Section  | Status |      Date       |
    +---------+-------------------------+----------+--------+-----------------+
    | 1.1     | Corrected first fixed   | Fixed    | Final  | 2019-October-07 |
    |         | release information.    | Software |        |                 |
    +---------+-------------------------+----------+--------+-----------------+
    | 1.0     | Initial public release. | -        | Final  | 2019-October-02 |
    +---------+-------------------------+----------+--------+-----------------+


==================================================================================


Cisco Adaptive Security Appliance Software and Firepower Threat Defense
Software FTP Inspection Denial of Service Vulnerability

Priority:        High

Advisory ID:     cisco-sa-20191002-asa-dos

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvo83169

CVE-2019-12673   

CWE-119

CVSS Score:
8.6  AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X

Summary

  o A vulnerability in the FTP inspection engine of Cisco Adaptive Security
    (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could
    allow an unauthenticated, remote attacker to cause a denial of service
    (DoS) condition on an affected device.

    The vulnerability is due to insufficient validation of FTP data. An
    attacker could exploit this vulnerability by sending malicious FTP traffic
    through an affected device. A successful exploit could allow the attacker
    to cause a DoS condition on the affected device.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-dos

    This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication, which includes 10 Cisco Security
    Advisories that describe 18 vulnerabilities. For a complete list of the
    advisories and links to them, see Cisco Event Response: October 2019 Cisco
    ASA, FMC, and FTD Software Security Advisory Bundled Publication .

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco products if they are running a vulnerable
    release of Cisco ASA Software or Cisco FTD Software that is configured to
    perform FTP inspection.

    FTP inspection is enabled by default in Cisco FTD Software. For detailed
    information about the default settings for application inspection policies,
    see the Cisco ASA Series Firewall CLI Configuration Guide .

    Determine Whether FTP Inspection Is Enabled on an ASA

    To determine whether FTP inspection is enabled on an ASA, administrators
    can use the show running-config policy-map command and then the show
    running-config service-policy command.

    First use the show running-config policy-map command, and check whether the
    inspect ftp command is present in at least one policy map. In the following
    output, the global-policy policy map includes the inspect ftp command:

        asa# show running-config policy-map
        !
        policy-map global_policy
         class inspection_default
          inspect ip-options
          inspect netbios
          inspect rtsp
          inspect sunrpc
          inspect tftp
          inspect xdmcp
          inspect dns preset_dns_map
          inspect ftp
          inspect h323 h225

    Next use the show running-config service-policy command, and check whether
    the policy map is applied, either globally or to a single interface. The
    following output shows the global-policy policy map applied globally:

        asa# show running-config service-policy
        service-policy global_policy global

    If the policy map that contains the inspect ftp command is applied globally
    or to an interface, FTP inspection is enabled.

    Determine Whether FTP Inspection Is Enabled on FTD

    To determine whether FTP inspection is enabled on FTD, administrators can
    do one of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), open Cisco FMC, choose Policies > Access Control > Malware &
        File , and then choose an access control rule. Click the File Policy 
        tab to view detailed information about file policies that are
        associated with the rule.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), open Cisco FDM, choose Policies > Access Control , and then
        choose an access control rule. Click the File Policy tab to view
        detailed information about file policies that are associated with the
        rule. Note that Cisco FDM supports predefined file policies only;
        administrators cannot create file policies for access control rules.

    For information about which Cisco ASA Software and FTD Software releases
    are vulnerable, see the Fixed Software section of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect Cisco FMC
    Software.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    In the following tables, the left column lists releases of Cisco ASA
    Software, Cisco FMC Software, or Cisco FTD Software. The center column
    indicates whether a release is affected by the vulnerability described in
    this advisory and the first release that includes the fix for this
    vulnerability. The right column indicates whether a release is affected by
    any of the vulnerabilities described in this bundle and which release
    includes fixes for those vulnerabilities.

    Cisco ASA Software

    Cisco ASA     First Fixed Release  First Fixed Release for All
    Software      for This             Vulnerabilities Described in the Bundle
    Release       Vulnerability        of Advisories
    Earlier than  Migrate to a fixed   Migrate to a fixed release.
    9.4 ^1        release.
    9.4 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.5 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.6           9.6.4.34             9.6.4.34
    9.7 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.8           9.8.4.10             9.8.4.10
    9.9           9.9.2.56             Migrate to a fixed release.
    9.10          9.10.1.30            9.10.1.30
    9.12          9.12.2.5             9.12.2.5
    9.13          Not vulnerable.      Not vulnerable.

    1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7,
    have reached end of software maintenance. Customers are advised to migrate
    to a supported release that includes the fix for this vulnerability.

    Cisco FTD Software

    Cisco FTD     First Fixed Release  First Fixed Release for All
    Software      for This             Vulnerabilities Described in the Bundle
    Release       Vulnerability        of Advisories
    Earlier than  Migrate to a fixed   Migrate to a fixed release.
    6.1.0 ^1      release.
    6.1.0         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.0         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.1         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.2         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.3         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.3.0         6.3.0.5 (late        6.4.0.4
                  October 2019)
    6.4.0         6.4.0.4              6.4.0.4
    6.5.0         Not vulnerable.      Not vulnerable.

    1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end
    of software maintenance. Customers are advised to migrate to a supported
    release that includes the fix for this vulnerability.

    To upgrade to a fixed release of Cisco FTD Software, customers can do one
    of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), use the FMC interface to install the upgrade. After installation
        is complete, reapply the access control policy.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), use the FDM interface to install the upgrade. After installation
        is complete, reapply the access control policy.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-dos

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================

Cisco Adaptive Security Appliance Software and Firepower Threat Defense
Software IKEv1 Denial of Service Vulnerability

Priority:        High

Advisory ID:     cisco-sa-20191002-asa-ftd-ikev1-dos

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvo11077

CVE-2019-15256   

CWE-399

CVSS Score:
8.6  AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X

Summary

  o A vulnerability in the Internet Key Exchange version 1 (IKEv1) feature of
    Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat
    Defense (FTD) Software could allow an unauthenticated, remote attacker to
    trigger a reload of an affected device, resulting in a denial of service
    (DoS) condition.

    The vulnerability is due to improper management of system memory. An
    attacker could exploit this vulnerability by sending malicious IKEv1
    traffic to an affected device. The attacker does not need valid credentials
    to authenticate the VPN session, nor does the attacker's source address
    need to match a peer statement in the crypto map applied to the ingress
    interface of the affected device. An exploit could allow the attacker to
    exhaust system memory resources, leading to a reload of an affected device.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ftd-ikev1-dos

    This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication, which includes 10 Cisco Security
    Advisories that describe 18 vulnerabilities. For a complete list of the
    advisories and links to them, see Cisco Event Response: October 2019 Cisco
    ASA, FMC, and FTD Software Security Advisory Bundled Publication .

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products when running a
    vulnerable release of Cisco ASA Software or Cisco FTD Software on
    interfaces that have the IKEv1 protocol enabled for LAN-to-LAN or Remote
    Access IPsec VPN connections:

       Adaptive Security Virtual Appliance (ASAv)
       Firepower 2100 Series Appliances
       Firepower Threat Defense Virtual (FTDv)

    The IKEv1 protocol is disabled in Cisco ASA Software and FTD Software by
    default.

    Note: IKE version 2 (IKEv2)-based VPN connections are not affected by this
    vulnerability.

    For information about which Cisco ASA Software and FTD Software releases
    are vulnerable, see the Fixed Software section of this advisory.

    Determine Whether the IKEv1 Protocol Is Configured

    To enable the IKEv1 protocol for LAN-to-LAN or Remote Access IPsec VPN
    connections, two conditions need to be true:

     1. An Internet Security Association and Key Management Protocol (ISAKMP)
        policy for IKEv1 needs to be configured.
     2. IKEv1 needs to be enabled on at least one interface.

    Administrators can use the show running-config crypto ikev1 command to
    determine whether an ISAKMP policy for IKEv1 is configured and whether
    IKEv1 is enabled on at least one interface. The following example shows the
    output of the show running-config crypto ikev1 command on a device that has
    ISAKMP policy 1 configured for IKEv1 and that has IKEv1 enabled on the
    outside interface:

        ciscoasa# show running-config crypto ikev1
        crypto ikev1 enable outside
        crypto ikev1 policy 1
         authentication pre-share
         encryption aes
         hash sha
         group 2
         lifetime 86400

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    Cisco products:
       3000 Series Industrial Security Appliances (ISAs)
       ASA 1000V Cloud Firewall
       ASA 5505 Series Adaptive Security Appliances
       ASA 5500-X Series Firewalls
       ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco
        7600 Series Routers
       Firepower 1000 Series
       Firepower 4100 Series
       Firepower 9300 ASA Security Module
       Firepower 9300 Security Appliances
       Firepower Management Center (FMC)

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o 
    Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    In the following tables, the left column lists releases of Cisco ASA
    Software, Cisco FMC Software, or Cisco FTD Software. The center column
    indicates whether a release is affected by the vulnerability described in
    this advisory and the first release that includes the fix for this
    vulnerability. The right column indicates whether a release is affected by
    any of the vulnerabilities described in this bundle and which release
    includes fixes for those vulnerabilities.

    Cisco ASA Software

      Cisco ASA   First Fixed Release        First Fixed Release for All
      Software          for This       Vulnerabilities Described in the Bundle
       Release       Vulnerability                  of Advisories
    Earlier than  Not vulnerable.      Migrate to a fixed release.
    9.4 ^1
    9.4 ^1        Not vulnerable.      Migrate to a fixed release.
    9.5 ^1        Not vulnerable.      Migrate to a fixed release.
    9.6           Not vulnerable.      9.6.4.34
    9.7 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.8           9.8.3.26             9.8.4.10
    9.9           9.9.2.47             Migrate to a fixed release.
    9.10          9.10.1.17            9.10.1.30
    9.12          9.12.2               9.12.2.5
    9.13          Not vulnerable.      Not vulnerable.

    1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7,
    have reached end of software maintenance. Customers are advised to migrate
    to a supported release that includes the fix for this vulnerability.

    Cisco FTD Software

      Cisco FTD   First Fixed Release        First Fixed Release for All
      Software          for This       Vulnerabilities Described in the Bundle
       Release       Vulnerability                  of Advisories
    Earlier than  Not vulnerable.      Migrate to a fixed release.
    6.1.0 ^1
    6.1.0         Not vulnerable.      Migrate to a fixed release.
    6.2.0         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.1         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.2         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.3         6.2.3.11             Migrate to a fixed release.
    6.3.0         6.3.0.2              6.4.0.4
    6.4.0         Not vulnerable.      6.4.0.4
    6.5.0         Not vulnerable.      Not vulnerable.

    1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end
    of software maintenance. Customers are advised to migrate to a supported
    release that includes the fix for this vulnerability.

    To upgrade to a fixed release of Cisco FTD Software, customers can do one
    of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), use the FMC interface to install the upgrade. After installation
        is complete, reapply the access control policy.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), use the FDM interface to install the upgrade. After installation
        is complete, reapply the access control policy.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during the resolution of a Cisco TAC support
    case.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ftd-ikev1-dos

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================

Cisco Adaptive Security Appliance Software and Firepower Threat Defense
Software OSPF LSA Processing Denial of Service Vulnerability

Priority:        High

Advisory ID:     cisco-sa-20191002-asa-ospf-lsa-dos

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvp49790

CVE-2019-12676   

CWE-20

CVSS Score:
7.4  AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X

Summary

  o A vulnerability in the Open Shortest Path First (OSPF) implementation of
    Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat
    Defense (FTD) Software could allow an unauthenticated, adjacent attacker to
    cause a reload of an affected device, resulting in a denial of service
    (DoS) condition.

    The vulnerability exists because the affected software improperly parses
    certain options in OSPF link-state advertisement (LSA) type 11 packets. An
    attacker could exploit this vulnerability by sending a crafted LSA type 11
    OSPF packet to an affected device. A successful exploit could allow the
    attacker to cause a reload of the affected device, resulting in a DoS
    condition for client traffic that is traversing the device.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ospf-lsa-dos

    This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication, which includes 10 Cisco Security
    Advisories that describe 18 vulnerabilities. For a complete list of the
    advisories and links to them, see Cisco Event Response: October 2019 Cisco
    ASA, FMC, and FTD Software Security Advisory Bundled Publication .

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco products that are running a vulnerable
    release of Cisco ASA Software or Cisco FTD Software that is configured to
    support OSPF routing.

    Determine Whether OSPF Routing Is Configured on an ASA

    To determine whether OSPF routing is configured on an ASA, administrators
    can use the show ospf privileged mode command. If no output is returned,
    OSPF routing is not configured. In the following example, the device is
    configured for OSPF routing:

        asa# show ospf

        Routing Process "ospf 2" with ID 10.1.89.2 and Domain ID 0.0.0.2
        Supports only single TOS(TOS0) routes
        Supports opaque LSA
        .
        .
        .

    Determine Whether OSPF Routing Is Configured on FTD

    To determine whether OSPF routing is configured on FTD, administrators can
    do one of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), choose Devices > Device Management , select the device of
        interest, and then choose Routing > OSPF . If either Process 1 or
        Process 2 has a check mark, OSPF is enabled on the device.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), choose Device > Advanced Configuration > View Configuration > 
        Smart CLI > Routing . If there is an object with the type of OSPF ,
        then OSPF is enabled on the device.

    For information about which Cisco ASA Software and FTD Software releases
    are vulnerable, see the Fixed Software section of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect Cisco FMC
    Software.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    In the following tables, the left column lists releases of Cisco ASA
    Software, Cisco FMC Software, or Cisco FTD Software. The center column
    indicates whether a release is affected by the vulnerability described in
    this advisory and the first release that includes the fix for this
    vulnerability. The right column indicates whether a release is affected by
    any of the vulnerabilities described in this bundle and which release
    includes fixes for those vulnerabilities.

    Cisco ASA Software

    Cisco ASA     First Fixed Release  First Fixed Release for All
    Software      for This             Vulnerabilities Described in the Bundle
    Release       Vulnerability        of Advisories
    Earlier than  Migrate to a fixed   Migrate to a fixed release.
    9.4 ^1        release.
    9.4 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.5 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.6           9.6.4.34             9.6.4.34
    9.7 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.8           9.8.4.8              9.8.4.10
    9.9           Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.10          9.10.1.27            9.10.1.30
    9.12          9.12.2.1             9.12.2.5
    9.13          Not vulnerable.      Not vulnerable.

    1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7,
    have reached end of software maintenance. Customers are advised to migrate
    to a supported release that includes the fix for this vulnerability.

    Cisco FTD Software

    Cisco FTD     First Fixed Release  First Fixed Release for All
    Software      for This             Vulnerabilities Described in the Bundle
    Release       Vulnerability        of Advisories
    Earlier than  Migrate to a fixed   Migrate to a fixed release.
    6.1.0 ^1      release.
    6.1.0         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.0         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.1         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.2         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.3         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.3.0         6.3.0.4              6.4.0.4
    6.4.0         6.4.0.4              6.4.0.4
    6.5.0         Not vulnerable.      Not vulnerable.

    1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end
    of software maintenance. Customers are advised to migrate to a supported
    release that includes the fix for this vulnerability.

    To upgrade to a fixed release of Cisco FTD Software, customers can do one
    of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), use the FMC interface to install the upgrade. After installation
        is complete, reapply the access control policy.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), use the FDM interface to install the upgrade. After installation
        is complete, reapply the access control policy.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ospf-lsa-dos

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================


Cisco Adaptive Security Appliance Software and Firepower Threat Defense
Software SIP Inspection Denial of Service Vulnerability

Priority:        High

Advisory ID:     cisco-sa-20191002-asa-ftd-sip-dos

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvp45882

CVE-2019-12678   

CWE-191

CVSS Score:
8.6  AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X

Summary

  o A vulnerability in the Session Initiation Protocol (SIP) inspection module
    of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower
    Threat Defense (FTD) Software could allow an unauthenticated, remote
    attacker to cause a denial of service (DoS) condition on an affected
    device.

    The vulnerability is due to improper parsing of SIP messages. An attacker
    could exploit this vulnerability by sending a malicious SIP packet through
    an affected device. A successful exploit could allow the attacker to
    trigger an integer underflow, causing the software to try to read unmapped
    memory and resulting in a crash.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ftd-sip-dos

    This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication, which includes 10 Cisco Security
    Advisories that describe 18 vulnerabilities. For a complete list of the
    advisories and links to them, see Cisco Event Response: October 2019 Cisco
    ASA, FMC, and FTD Software Security Advisory Bundled Publication .

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco products that are running a vulnerable
    release of Cisco ASA Software or Cisco FTD Software and that have the SIP
    inspection feature enabled. SIP inspection is enabled by default in Cisco
    ASA Software and FTD Software. For detailed information about the default
    settings for application inspection policies, refer to the Cisco ASA Series
    Firewall CLI Configuration Guide .

    For information about which Cisco ASA Software and FTD Software releases
    are vulnerable, see the Fixed Software section of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect Cisco Firepower
    Management Center (FMC) Software.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    In the following tables, the left column lists releases of Cisco ASA
    Software, Cisco FMC Software, or Cisco FTD Software. The center column
    indicates whether a release is affected by the vulnerability described in
    this advisory and the first release that includes the fix for this
    vulnerability. The right column indicates whether a release is affected by
    any of the vulnerabilities described in this bundle and which release
    includes fixes for those vulnerabilities.

    Cisco ASA Software

      Cisco ASA   First Fixed Release        First Fixed Release for All
      Software          for This       Vulnerabilities Described in the Bundle
       Release       Vulnerability                  of Advisories
    Earlier than  Migrate to a fixed   Migrate to a fixed release.
    9.4 ^1        release.
    9.4 ^1        9.4.4.37             Migrate to a fixed release.
    9.5 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.6           9.6.4.34             9.6.4.34
    9.7 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.8           9.8.4.7              9.8.4.10
    9.9           9.9.2.56             Migrate to a fixed release.
    9.10          9.10.1.27            9.10.1.30
    9.12          9.12.2.1             9.12.2.5
    9.13          Not vulnerable.      Not vulnerable.

    1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7,
    have reached end of software maintenance. Customers are advised to migrate
    to a supported release that includes the fix for this vulnerability.

    Cisco FTD Software

      Cisco FTD   First Fixed Release        First Fixed Release for All
      Software          for This       Vulnerabilities Described in the Bundle
       Release       Vulnerability                  of Advisories
    Earlier than  Migrate to a fixed   Migrate to a fixed release.
    6.1.0 ^1      release.
    6.1.0         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.0         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.1         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.2         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.3         6.2.3.15             Migrate to a fixed release.
    6.3.0         6.3.0.4              6.4.0.4
    6.4.0         6.4.0.4              6.4.0.4
    6.5.0         Not vulnerable.      Not vulnerable.

    1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end
    of software maintenance. Customers are advised to migrate to a supported
    release that includes the fix for this vulnerability.

    To upgrade to a fixed release of Cisco FTD Software, customers can do one
    of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), use the FMC interface to install the upgrade. After installation
        is complete, reapply the access control policy.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), use the FDM interface to install the upgrade. After installation
        is complete, reapply the access control policy.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ftd-sip-dos

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================


Cisco Adaptive Security Appliance Software and Firepower Threat Defense
Software WebVPN CPU Denial of Service Vulnerability

Priority:        Medium

Advisory ID:     cisco-sa-20191002-asa-ftd-dos

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvp76944

CVE-2019-12698   

CWE-400

CVSS Score:
5.3  AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:X/RL:X/RC:X

Summary

  o A vulnerability in the WebVPN feature of Cisco Adaptive Security Appliance
    (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could
    allow an unauthenticated, remote attacker to cause increased CPU
    utilization on an affected device.

    The vulnerability is due to excessive processing load for a specific WebVPN
    HTTP page request. An attacker could exploit this vulnerability by sending
    multiple WebVPN HTTP page load requests for a specific URL. A successful
    exploit could allow the attacker to increase CPU load on the device,
    resulting in a denial of service (DoS) condition, which could cause traffic
    to be delayed through the device.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ftd-dos

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco products running Cisco ASA Software or FTD
    Software when configured for WebVPN.

    For information about which Cisco ASA Software and FTD Software releases
    are vulnerable, see the Fixed Software section of this advisory.

    Determine If WebVPN Is Enabled

    To determine if the WebVPN service is enabled on a device, administrators
    can use the show running-config webvpn privileged EXEC command and refer to
    the output of the command. The following example shows the output of the
    command for a device that has the WebVPN service enabled:

        ciscoasa# show running-config webvpn
        .
        .
        .
        webvpn
        enable interface_name
        .
        .
        .

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    Cisco products:

       Firepower Management Center (FMC)
       Firepower Management Center 1000

Indicators of Compromise

  o During active exploitation of this vulnerability, administrators may notice
    increased CPU usage by the Unicorn Proxy Thread process. This can be
    checked by issuing the show processes cpu-usage non-zero command at the CLI
    and reviewing the statistics for the Unicorn Proxy Thread process.

        ciscoasa# show processes cpu-usage non-zero
        Hardware:   ASA5516
        Cisco Adaptive Security Appliance Software Version 9.8(2)38
        ASLR enabled, text region 7f313ea71000-7f3142d61bb4
        PC         Thread       5Sec     1Min     5Min   Process
        0x00007f3140f35888   0x00002aaacfaa8b20     7.7%     5.0%     3.0%   Unicorn Proxy Thread
           -          -         9.5%     1.9%     0.8%   DATAPATH-0-2044
           -          -         3.6%     1.4%     0.8%   DATAPATH-1-2045

    It should be noted that this output is an example. Administrators would
    need to compare the output values from their device(s) to baseline values
    from normal device operation.

Workarounds

  o There are no workarounds that address this vulnerability.

    It is possible that during active exploitation, an administrator could
    mitigate the attack by implementing an access control list (ACL) to block
    the incoming requests or perform rate limiting.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    In the following table(s), the left column lists releases of Cisco ASA
    Software, Cisco FMC Software, or Cisco FTD Software. The right column
    indicates whether a release is affected by the vulnerability described in
    this advisory and the first release that includes the fix for this
    vulnerability.

    Cisco ASA Software

    Cisco ASA Software Release   First Fixed Release for This Vulnerability
    Earlier than 9.4 ^1          Migrate to a fixed release.
    9.4 ^1                       Migrate to a fixed release.
    9.5 ^1                       Migrate to a fixed release.
    9.6                          9.6.4.31
    9.7 ^1                       Migrate to a fixed release.
    9.8                          9.8.4.9
    9.9                          9.9.2.56
    9.10                         9.10.1.30
    9.12                         9.12.2.9
    9.13                         9.13.1

    1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7,
    have reached end of software maintenance. Customers are advised to migrate
    to a supported release that includes the fix for this vulnerability.

    Cisco FTD Software

    Cisco FTD Software Release   First Fixed Release for This Vulnerability
    Earlier than 6.1.0 ^1        Migrate to a fixed release.
    6.1.0                        Migrate to a fixed release.
    6.2.0                        Migrate to a fixed release.
    6.2.1                        Migrate to a fixed release.
    6.2.2                        Migrate to a fixed release.
    6.2.3                        6.2.3.15
    6.3.0                        6.3.0.5
    6.4.0                        6.4.0.6
    6.5.0                        Not vulnerable.

    1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end
    of software maintenance. Customers are advised to migrate to a supported
    release that includes the fix for this vulnerability.

    To upgrade to a fixed release of Cisco FTD Software, customers can do one
    of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), use the FMC interface to install the upgrade. After installation
        is complete, reapply the access control policy.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), use the FDM interface to install the upgrade. After installation
        is complete, reapply the access control policy.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o Cisco would like to thank Qian Chen of Qihoo 360 Nirvan Team for reporting
    this vulnerability.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ftd-dos

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================


Cisco Adaptive Security Appliance and Firepower Threat Defense Software WebVPN
Cross-Site Scripting Vulnerability

Priority:        Medium

Advisory ID:     cisco-sa-20191002-asa-xss

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvp33341

CVE-2019-12695   

CWE-79

CVSS Score:
6.1  AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in the Clientless SSL VPN (WebVPN) portal of Cisco Adaptive
    Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) Software
    could allow an unauthenticated, remote attacker to conduct a cross-site
    scripting (XSS) attack against a user of the web-based management interface
    of an affected device.

    The vulnerability is due to insufficient validation of user-supplied input
    by the web-based management interface of an affected device. An attacker
    could exploit this vulnerability by persuading a user of the interface to
    click a crafted link. A successful exploit could allow the attacker to
    execute arbitrary script code in the context of the interface or allow the
    attacker to access sensitive browser-based information.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-xss

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco products running Cisco ASA Software or FTD
    Software when configured for WebVPN.

    For information about which Cisco ASA Software and FTD Software releases
    are vulnerable, see the Fixed Software section of this advisory.

    Determine If WebVPN Is Enabled

    To determine if the WebVPN service is enabled on a device, administrators
    can use the show running-config webvpn privileged EXEC command and refer to
    the output of the command. The following example shows the output of the
    command for a device that has the WebVPN service enabled:

        ciscoasa# show running-config webvpn
        .
        .
        .
        webvpn
        enable interface_name
        .
        .
        .

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    Cisco products:

       Firepower Management Center (FMC)
       Firepower Management Center 1000

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    In the following table(s), the left column lists releases of Cisco ASA
    Software, Cisco FMC Software, or Cisco FTD Software. The right column
    indicates whether a release is affected by the vulnerability described in
    this advisory and the first release that includes the fix for this
    vulnerability.

    Cisco ASA Software

    Cisco ASA Software Release   First Fixed Release for This Vulnerability
    Earlier than 9.4 ^1          Migrate to a fixed release.
    9.4 ^1                       Migrate to a fixed release.
    9.5 ^1                       Migrate to a fixed release.
    9.6                          9.6.4.31
    9.7 ^1                       Migrate to a fixed release.
    9.8                          9.8.4.9
    9.9                          9.9.2.56
    9.10                         9.10.1.30
    9.12                         9.12.2.9
    9.13                         9.13.1

    1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7,
    have reached end of software maintenance. Customers are advised to migrate
    to a supported release that includes the fix for this vulnerability.

    Cisco FTD Software

    Cisco FTD Software Release   First Fixed Release for This Vulnerability
    Earlier than 6.1.0 ^1        Migrate to a fixed release.
    6.1.0                        Migrate to a fixed release.
    6.2.0                        Migrate to a fixed release.
    6.2.1                        Migrate to a fixed release.
    6.2.2                        Migrate to a fixed release.
    6.2.3                        6.2.3.15
    6.3.0                        6.3.0.5
    6.4.0                        6.4.0.6
    6.5.0                        Not vulnerable.

    1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end
    of software maintenance. Customers are advised to migrate to a supported
    release that includes the fix for this vulnerability.

    To upgrade to a fixed release of Cisco FTD Software, customers can do one
    of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), use the FMC interface to install the upgrade. After installation
        is complete, reapply the access control policy.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), use the FDM interface to install the upgrade. After installation
        is complete, reapply the access control policy.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o Cisco would like to thank Qingtang Zheng from CodeSafe Team of Legendsec at
    Qi'anxin Group for reporting this vulnerability.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Action Links for This Advisory

  o Understanding Cross-Site Scripting (XSS) Threat Vectors

Related to This Advisory

  o Cross-Site Scripting

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-xss

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

===============================================================================

Cisco Adaptive Security Appliance Software and Firepower Threat Defense
Software OSPF LSA Processing Denial of Service Vulnerability

Priority:        High

Advisory ID:     cisco-sa-20191002-asa-ospf-lsa-dos

First Published: 2019 October 2 16:00 GMT

Last Updated:    2019 October 18 18:18 GMT

Version 1.2:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvp49790

CVE-2019-12676   

CWE-20

CVSS Score:
7.4  AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X

Summary

  o A vulnerability in the Open Shortest Path First (OSPF) implementation of
    Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat
    Defense (FTD) Software could allow an unauthenticated, adjacent attacker to
    cause a reload of an affected device, resulting in a denial of service
    (DoS) condition.

    The vulnerability exists because the affected software improperly parses
    certain options in OSPF link-state advertisement (LSA) type 11 packets. An
    attacker could exploit this vulnerability by sending a crafted LSA type 11
    OSPF packet to an affected device. A successful exploit could allow the
    attacker to cause a reload of the affected device, resulting in a DoS
    condition for client traffic that is traversing the device.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ospf-lsa-dos

    This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication, which includes 10 Cisco Security
    Advisories that describe 18 vulnerabilities. For a complete list of the
    advisories and links to them, see Cisco Event Response: October 2019 Cisco
    ASA, FMC, and FTD Software Security Advisory Bundled Publication .

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco products that are running a vulnerable
    release of Cisco ASA Software or Cisco FTD Software that is configured to
    support OSPF routing.

    Determine Whether OSPF Routing Is Configured on an ASA

    To determine whether OSPF routing is configured on an ASA, administrators
    can use the show ospf privileged mode command. If no output is returned,
    OSPF routing is not configured. In the following example, the device is
    configured for OSPF routing:

        asa# show ospf

        Routing Process "ospf 2" with ID 10.1.89.2 and Domain ID 0.0.0.2
        Supports only single TOS(TOS0) routes
        Supports opaque LSA
        .
        .
        .

    Determine Whether OSPF Routing Is Configured on FTD

    To determine whether OSPF routing is configured on FTD, administrators can
    do one of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), choose Devices > Device Management , select the device of
        interest, and then choose Routing > OSPF . If either Process 1 or
        Process 2 has a check mark, OSPF is enabled on the device.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), choose Device > Advanced Configuration > View Configuration > 
        Smart CLI > Routing . If there is an object with the type of OSPF ,
        then OSPF is enabled on the device.

    For information about which Cisco ASA Software and FTD Software releases
    are vulnerable, see the Fixed Software section of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect Cisco FMC
    Software.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    In the following tables, the left column lists releases of Cisco ASA
    Software, Cisco FMC Software, or Cisco FTD Software. The center column
    indicates whether a release is affected by the vulnerability described in
    this advisory and the first release that includes the fix for this
    vulnerability. The right column indicates whether a release is affected by
    any of the vulnerabilities described in this bundle and which release
    includes fixes for those vulnerabilities.

    Cisco ASA Software

    Cisco ASA     First Fixed Release  First Fixed Release for All
    Software      for This             Vulnerabilities Described in the Bundle
    Release       Vulnerability        of Advisories
    Earlier than  Migrate to a fixed   Migrate to a fixed release.
    9.4 ^1        release.
    9.4 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.5 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.6           9.6.4.34             9.6.4.34
    9.7 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.8           9.8.4.8              9.8.4.10
    9.9           9.9.2.59             Migrate to a fixed release.
    9.10          9.10.1.27            9.10.1.30
    9.12          9.12.2.1             9.12.2.5
    9.13          Not vulnerable.      Not vulnerable.

    1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7,
    have reached end of software maintenance. Customers are advised to migrate
    to a supported release that includes the fix for this vulnerability.

    Cisco FTD Software

    Cisco FTD     First Fixed Release  First Fixed Release for All
    Software      for This             Vulnerabilities Described in the Bundle
    Release       Vulnerability        of Advisories
    Earlier than  Migrate to a fixed   Migrate to a fixed release.
    6.1.0 ^1      release.
    6.1.0         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.0         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.1         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.2         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.3         6.2.3.15             Migrate to a fixed release.
    6.3.0         6.3.0.4              6.4.0.4
    6.4.0         6.4.0.4              6.4.0.4
    6.5.0         Not vulnerable.      Not vulnerable.

    1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end
    of software maintenance. Customers are advised to migrate to a supported
    release that includes the fix for this vulnerability.

    To upgrade to a fixed release of Cisco FTD Software, customers can do one
    of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), use the FMC interface to install the upgrade. After installation
        is complete, reapply the access control policy.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), use the FDM interface to install the upgrade. After installation
        is complete, reapply the access control policy.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-ospf-lsa-dos

Revision History

  o +---------+------------------------+-----------+--------+-----------------+
    | Version |      Description       |  Section  | Status |      Date       |
    +---------+------------------------+-----------+--------+-----------------+
    | 1.2     | Updated FTD Fixed      | Fixed     | Final  | 2019-October-18 |
    |         | Release table.         | Software  |        |                 |
    +---------+------------------------+-----------+--------+-----------------+
    | 1.1     | Updated ASA Fixed      | Fixed     | Final  | 2019-October-04 |
    |         | Release table.         | Software  |        |                 |
    +---------+------------------------+-----------+--------+-----------------+
    | 1.0     | Initial public         | -         | Final  | 2019-October-02 |
    |         | release.               |           |        |                 |
    +---------+------------------------+-----------+--------+-----------------+

===============================================================================


Cisco Adaptive Security Appliance Software and Firepower Threat Defense
Software FTP Inspection Denial of Service Vulnerability

Priority:        High

Advisory ID:     cisco-sa-20191002-asa-dos

First Published: 2019 October 2 16:00 GMT

Last Updated:    2019 October 18 18:18 GMT

Version 1.1:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvo83169

CVE-2019-12673   

CWE-119

CVSS Score:
8.6  AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X

Summary

  o A vulnerability in the FTP inspection engine of Cisco Adaptive Security
    (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could
    allow an unauthenticated, remote attacker to cause a denial of service
    (DoS) condition on an affected device.

    The vulnerability is due to insufficient validation of FTP data. An
    attacker could exploit this vulnerability by sending malicious FTP traffic
    through an affected device. A successful exploit could allow the attacker
    to cause a DoS condition on the affected device.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-dos

    This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication, which includes 10 Cisco Security
    Advisories that describe 18 vulnerabilities. For a complete list of the
    advisories and links to them, see Cisco Event Response: October 2019 Cisco
    ASA, FMC, and FTD Software Security Advisory Bundled Publication .

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco products if they are running a vulnerable
    release of Cisco ASA Software or Cisco FTD Software that is configured to
    perform FTP inspection.

    FTP inspection is enabled by default in Cisco FTD Software. For detailed
    information about the default settings for application inspection policies,
    see the Cisco ASA Series Firewall CLI Configuration Guide .

    Determine Whether FTP Inspection Is Enabled on an ASA

    To determine whether FTP inspection is enabled on an ASA, administrators
    can use the show running-config policy-map command and then the show
    running-config service-policy command.

    First use the show running-config policy-map command, and check whether the
    inspect ftp command is present in at least one policy map. In the following
    output, the global-policy policy map includes the inspect ftp command:

        asa# show running-config policy-map
        !
        policy-map global_policy
         class inspection_default
          inspect ip-options
          inspect netbios
          inspect rtsp
          inspect sunrpc
          inspect tftp
          inspect xdmcp
          inspect dns preset_dns_map
          inspect ftp
          inspect h323 h225

    Next use the show running-config service-policy command, and check whether
    the policy map is applied, either globally or to a single interface. The
    following output shows the global-policy policy map applied globally:

        asa# show running-config service-policy
        service-policy global_policy global

    If the policy map that contains the inspect ftp command is applied globally
    or to an interface, FTP inspection is enabled.

    Determine Whether FTP Inspection Is Enabled on FTD

    To determine whether FTP inspection is enabled on FTD, administrators can
    do one of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), open Cisco FMC, choose Policies > Access Control > Malware &
        File , and then choose an access control rule. Click the File Policy 
        tab to view detailed information about file policies that are
        associated with the rule.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), open Cisco FDM, choose Policies > Access Control , and then
        choose an access control rule. Click the File Policy tab to view
        detailed information about file policies that are associated with the
        rule. Note that Cisco FDM supports predefined file policies only;
        administrators cannot create file policies for access control rules.

    For information about which Cisco ASA Software and FTD Software releases
    are vulnerable, see the Fixed Software section of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect Cisco FMC
    Software.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    In the following tables, the left column lists releases of Cisco ASA
    Software, Cisco FMC Software, or Cisco FTD Software. The center column
    indicates whether a release is affected by the vulnerability described in
    this advisory and the first release that includes the fix for this
    vulnerability. The right column indicates whether a release is affected by
    any of the vulnerabilities described in this bundle and which release
    includes fixes for those vulnerabilities.

    Cisco ASA Software

    Cisco ASA     First Fixed Release  First Fixed Release for All
    Software      for This             Vulnerabilities Described in the Bundle
    Release       Vulnerability        of Advisories
    Earlier than  Migrate to a fixed   Migrate to a fixed release.
    9.4 ^1        release.
    9.4 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.5 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.6           9.6.4.34             9.6.4.34
    9.7 ^1        Migrate to a fixed   Migrate to a fixed release.
                  release.
    9.8           9.8.4.10             9.8.4.10
    9.9           9.9.2.56             Migrate to a fixed release.
    9.10          9.10.1.30            9.10.1.30
    9.12          9.12.2.5             9.12.2.5
    9.13          Not vulnerable.      Not vulnerable.

    1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7,
    have reached end of software maintenance. Customers are advised to migrate
    to a supported release that includes the fix for this vulnerability.

    Cisco FTD Software

    Cisco FTD     First Fixed Release  First Fixed Release for All
    Software      for This             Vulnerabilities Described in the Bundle
    Release       Vulnerability        of Advisories
    Earlier than  Migrate to a fixed   Migrate to a fixed release.
    6.1.0 ^1      release.
    6.1.0         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.0         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.1         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.2         Migrate to a fixed   Migrate to a fixed release.
                  release.
    6.2.3         6.2.3.15             Migrate to a fixed release.
    6.3.0         6.3.0.5 (late        6.4.0.4
                  October 2019)
    6.4.0         6.4.0.4              6.4.0.4
    6.5.0         Not vulnerable.      Not vulnerable.

    1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end
    of software maintenance. Customers are advised to migrate to a supported
    release that includes the fix for this vulnerability.

    To upgrade to a fixed release of Cisco FTD Software, customers can do one
    of the following:

       For devices that are managed by using Cisco Firepower Management Center
        (FMC), use the FMC interface to install the upgrade. After installation
        is complete, reapply the access control policy.
       For devices that are managed by using Cisco Firepower Device Manager
        (FDM), use the FDM interface to install the upgrade. After installation
        is complete, reapply the access control policy.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software
    Security Advisory Bundled Publication

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-asa-dos

Revision History

  o +---------+------------------------+-----------+--------+-----------------+
    | Version |      Description       |  Section  | Status |      Date       |
    +---------+------------------------+-----------+--------+-----------------+
    | 1.1     | Updated FTD Fixed      | Fixed     | Final  | 2019-October-18 |
    |         | Release table.         | Software  |        |                 |
    +---------+------------------------+-----------+--------+-----------------+
    | 1.0     | Initial public         | -         | Final  | 2019-October-02 |
    |         | release.               |           |        |                 |
    +---------+------------------------+-----------+--------+-----------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXazi/2aOgq3Tt24GAQjapw/9GkCpsgw39e+iG4f/4zBVAZ0+Wd34nrL+
/cQo+7nQKdsC3+pcUykhwesiehMqEBo3xmAOHLUDDxJIr2DgWAsmsGh+gWZogJuu
SFWtesYPq+h5L5oLoQ5DfJ7L8V3/fTsky03GjatI/K8DOqR6IN7X2MRsJ59ya5dE
NLb5GpaUmHo4NI4iPIrJtZXSiCj0Ng9Q/CFyi3s/6llLT7FS7X6KHdi8/kyIvQx1
Lxis9v3K/u3GD33yEfqP/53EdpDdObU8m8EfT2cTjF+xlg3k9otCpFYTBi9OYqF1
WplhQi2tkZTGjLtoUjt71weur381zNuxwghXCf0EMvMQZjX7RgC9N1A6oubotENq
dEdZRZ/LqmQw1mlo4qGaSTPk5OY9zz2UGxyCNb2lRMfeI1Bak1cyCq8r17tdl4R2
C94iieNpn/aGEVXmfcJvLmGmZUNxMunMDI51KXSiMWYmFLPfZg21VRFHu+nOHzoP
/D2X0wALVaM8FErS/G2elsxjYnNo6ycHHC/roXlAfM1kKSqUWy57CJ5O0JtdzGl0
gf+rOOKtPzEVqJ+Hf7mPIntuQ3W5ZAn0QMHrNaPvNCFY5LugP30lcvU2YVG7qPPl
uUVO+qNi6/HxG+C7CujFw0+m8iGa/8TviAZUlCaYjEeq+KkGosTKjaaNKc7Wge9w
/oZZ91d6qzY=
=aLTG
-----END PGP SIGNATURE-----