Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.3698.3 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software 21 October 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Publisher: Cisco Systems Operating System: Network Appliance Impact/Access: Denial of Service -- Remote/Unauthenticated Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-15256 CVE-2019-12698 CVE-2019-12695 CVE-2019-12693 CVE-2019-12678 CVE-2019-12677 CVE-2019-12676 CVE-2019-12673 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ssl-vpn-dos https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-scp-dos https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-dos https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ftd-ikev1-dos https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ospf-lsa-dos https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ftd-sip-dos https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ftd-dos https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-xss Comment: This bulletin contains eight (10) Cisco Systems security advisories. Revision History: October 21 2019: Vendor updated associated Cisco bulletins (cisco-sa-20191002-asa-dos and cisco-sa-20191002-asa-ospf-lsa-dos) October 8 2019: Updated cisco-sa-20191002-asa-scp-dos to v1.1 October 3 2019: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Adaptive Security Appliance Software SSL VPN Denial of Service Vulnerability Priority: High Advisory ID: cisco-sa-20191002-asa-ssl-vpn-dos First Published: 2019 October 2 16:00 GMT Version 1.0: Final Workarounds: No workarounds availableCisco Bug IDs: CSCux45179 CVE-2019-12677 CWE-172 CVSS Score: 7.7 AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X Summary o A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition that prevents the creation of new SSL/Transport Layer Security (TLS) connections to an affected device. The vulnerability is due to incorrect handling of Base64-encoded strings. An attacker could exploit this vulnerability by opening many SSL VPN sessions to an affected device. The attacker would need to have valid user credentials on the affected device to exploit this vulnerability. A successful exploit could allow the attacker to overwrite a special system memory location, which will eventually result in memory allocation errors for new SSL/TLS sessions to the device, preventing successful establishment of these sessions. A reload of the device is required to recover from this condition. Established SSL/TLS connections to the device and SSL/TLS connections through the device are not affected. Note: Although this vulnerability is in the SSL VPN feature, successful exploitation of this vulnerability would affect all new SSL/TLS sessions to the device, including management sessions. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ssl-vpn-dos This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 18 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication . Affected Products o Vulnerable Products This vulnerability affects Cisco products that are running a vulnerable release of Cisco ASA Software and that have either the Clientless SSL VPN or AnyConnect SSL VPN enabled. For information about which Cisco ASA Software releases are vulnerable, see the Fixed Software section of this advisory. Determine Whether an SSL VPN Is Configured Administrators can use the show running-config webvpn command to determine whether the Clientless SSL VPN or AnyConnect SSL VPN is enabled. The following example shows the output of the command for a device that has the Clientless SSL VPN or AnyConnect SSL VPN enabled: ciscoasa# show running-config webvpn webvpn . . . enable <interface_name> . . . Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect Cisco Firepower Management Center (FMC) Software or Cisco Firepower Threat Defense (FTD) Software. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases In the following tables, the left column lists releases of Cisco ASA Software, Cisco FMC Software, or Cisco FTD Software. The center column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. The right column indicates whether a release is affected by any of the vulnerabilities described in this bundle and which release includes fixes for those vulnerabilities. Cisco ASA Software Cisco ASA First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Migrate to a fixed Migrate to a fixed release. 9.1 ^1 release. 9.1 ^1 9.1.7.4 Migrate to a fixed release. 9.2 ^1 9.2.4.8 Migrate to a fixed release. 9.3 ^1 9.3.3.9 Migrate to a fixed release. 9.4 ^1 9.4.2.11 Migrate to a fixed release. 9.5 ^1 9.5.2.5 Migrate to a fixed release. 9.6 9.6.2 9.6.4.34 9.7 ^1 Not vulnerable. Migrate to a fixed release. 9.8 Not vulnerable. 9.8.4.10 9.9 Not vulnerable. Migrate to a fixed release. 9.10 Not vulnerable. 9.10.1.30 9.12 Not vulnerable. 9.12.2.5 9.13 Not vulnerable. Not vulnerable. 1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during the resolution of a Cisco TAC support case. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ssl-vpn-dos Revision History o +---------+--------------------------+---------+--------+-----------------+ | Version | Description | Section | Status | Date | +---------+--------------------------+---------+--------+-----------------+ | 1.0 | Initial public release. | - | Final | 2019-October-02 | +---------+--------------------------+---------+--------+-----------------+ ================================================================================== Cisco Adaptive Security Appliance Software Secure Copy Denial of Service Vulnerability Priority: Medium Advisory ID: cisco-sa-20191002-asa-scp-dos First Published: 2019 October 2 16:00 GMT Last Updated: 2019 October 7 15:13 GMT Version 1.1: Final Workarounds: No workarounds availableCisco Bug IDs: CSCvo51265 CVE-2019-12693 CWE-704 CVSS Score: 6.8 AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X Summary o A vulnerability in the Secure Copy (SCP) feature of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to the use of an incorrect data type for a length variable. An attacker could exploit this vulnerability by initiating the transfer of a large file to an affected device via SCP. To exploit this vulnerability, the attacker would need to have valid privilege level 15 credentials on the affected device. A successful exploit could allow the attacker to cause the length variable to roll over, which could cause the affected device to crash. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-scp-dos Affected Products o Vulnerable Products This vulnerability affects Cisco products that are running any release of Cisco ASA Software and that have the SCP feature enabled. The SCP feature is not enabled in Cisco ASA Software by default. For information about which Cisco ASA Software releases are vulnerable, see the Fixed Software section of this advisory. Determine Whether Secure Copy Is Configured Administrators can use the show running-config ssh command to determine whether SCP is enabled. The following example shows the output of the command for a device that has the SCP feature enabled and that allows access to the SCP feature from the 10.10.10.0/24 network via the Management interface: ciscoasa# show running-config ssh ssh scopy enable ssh 10.10.10.0 255.255.255.0 Management Note: The device is vulnerable to requests only when they are sent from an IP address in the range configured in the ssh <remote_ip_address> <remote_subnet_mask> <interface_name> command. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect Cisco Firepower Threat Defense (FTD) Software or Cisco Firepower Management Center (FMC) Software. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases In the following table(s), the left column lists releases of Cisco ASA Software, Cisco FMC Software, or Cisco FTD Software. The right column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. Cisco ASA Software Cisco ASA Software Release First Fixed Release for This Vulnerability Earlier than 9.4 ^1 Migrate to a fixed release. 9.4 ^1 Migrate to a fixed release. 9.5 ^1 Migrate to a fixed release. 9.6 9.6.4.30 9.7 ^1 Migrate to a fixed release. 9.8 9.8.4 9.9 9.9.2.50 9.10 9.10.1.22 9.12 9.12.2.1 9.13 Not vulnerable. 1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during the resolution of a Cisco TAC support case. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-scp-dos Revision History o +---------+-------------------------+----------+--------+-----------------+ | Version | Description | Section | Status | Date | +---------+-------------------------+----------+--------+-----------------+ | 1.1 | Corrected first fixed | Fixed | Final | 2019-October-07 | | | release information. | Software | | | +---------+-------------------------+----------+--------+-----------------+ | 1.0 | Initial public release. | - | Final | 2019-October-02 | +---------+-------------------------+----------+--------+-----------------+ ================================================================================== Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software FTP Inspection Denial of Service Vulnerability Priority: High Advisory ID: cisco-sa-20191002-asa-dos First Published: 2019 October 2 16:00 GMT Version 1.0: Final Workarounds: No workarounds availableCisco Bug IDs: CSCvo83169 CVE-2019-12673 CWE-119 CVSS Score: 8.6 AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X Summary o A vulnerability in the FTP inspection engine of Cisco Adaptive Security (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of FTP data. An attacker could exploit this vulnerability by sending malicious FTP traffic through an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-dos This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 18 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication . Affected Products o Vulnerable Products This vulnerability affects Cisco products if they are running a vulnerable release of Cisco ASA Software or Cisco FTD Software that is configured to perform FTP inspection. FTP inspection is enabled by default in Cisco FTD Software. For detailed information about the default settings for application inspection policies, see the Cisco ASA Series Firewall CLI Configuration Guide . Determine Whether FTP Inspection Is Enabled on an ASA To determine whether FTP inspection is enabled on an ASA, administrators can use the show running-config policy-map command and then the show running-config service-policy command. First use the show running-config policy-map command, and check whether the inspect ftp command is present in at least one policy map. In the following output, the global-policy policy map includes the inspect ftp command: asa# show running-config policy-map ! policy-map global_policy class inspection_default inspect ip-options inspect netbios inspect rtsp inspect sunrpc inspect tftp inspect xdmcp inspect dns preset_dns_map inspect ftp inspect h323 h225 Next use the show running-config service-policy command, and check whether the policy map is applied, either globally or to a single interface. The following output shows the global-policy policy map applied globally: asa# show running-config service-policy service-policy global_policy global If the policy map that contains the inspect ftp command is applied globally or to an interface, FTP inspection is enabled. Determine Whether FTP Inspection Is Enabled on FTD To determine whether FTP inspection is enabled on FTD, administrators can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), open Cisco FMC, choose Policies > Access Control > Malware & File , and then choose an access control rule. Click the File Policy tab to view detailed information about file policies that are associated with the rule. For devices that are managed by using Cisco Firepower Device Manager (FDM), open Cisco FDM, choose Policies > Access Control , and then choose an access control rule. Click the File Policy tab to view detailed information about file policies that are associated with the rule. Note that Cisco FDM supports predefined file policies only; administrators cannot create file policies for access control rules. For information about which Cisco ASA Software and FTD Software releases are vulnerable, see the Fixed Software section of this advisory. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect Cisco FMC Software. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases In the following tables, the left column lists releases of Cisco ASA Software, Cisco FMC Software, or Cisco FTD Software. The center column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. The right column indicates whether a release is affected by any of the vulnerabilities described in this bundle and which release includes fixes for those vulnerabilities. Cisco ASA Software Cisco ASA First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Migrate to a fixed Migrate to a fixed release. 9.4 ^1 release. 9.4 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.5 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.6 9.6.4.34 9.6.4.34 9.7 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.8 9.8.4.10 9.8.4.10 9.9 9.9.2.56 Migrate to a fixed release. 9.10 9.10.1.30 9.10.1.30 9.12 9.12.2.5 9.12.2.5 9.13 Not vulnerable. Not vulnerable. 1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco FTD Software Cisco FTD First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Migrate to a fixed Migrate to a fixed release. 6.1.0 ^1 release. 6.1.0 Migrate to a fixed Migrate to a fixed release. release. 6.2.0 Migrate to a fixed Migrate to a fixed release. release. 6.2.1 Migrate to a fixed Migrate to a fixed release. release. 6.2.2 Migrate to a fixed Migrate to a fixed release. release. 6.2.3 Migrate to a fixed Migrate to a fixed release. release. 6.3.0 6.3.0.5 (late 6.4.0.4 October 2019) 6.4.0 6.4.0.4 6.4.0.4 6.5.0 Not vulnerable. Not vulnerable. 1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. To upgrade to a fixed release of Cisco FTD Software, customers can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy. For devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-dos Revision History o +---------+--------------------------+---------+--------+-----------------+ | Version | Description | Section | Status | Date | +---------+--------------------------+---------+--------+-----------------+ | 1.0 | Initial public release. | - | Final | 2019-October-02 | +---------+--------------------------+---------+--------+-----------------+ ================================================================================== Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IKEv1 Denial of Service Vulnerability Priority: High Advisory ID: cisco-sa-20191002-asa-ftd-ikev1-dos First Published: 2019 October 2 16:00 GMT Version 1.0: Final Workarounds: No workarounds availableCisco Bug IDs: CSCvo11077 CVE-2019-15256 CWE-399 CVSS Score: 8.6 AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X Summary o A vulnerability in the Internet Key Exchange version 1 (IKEv1) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper management of system memory. An attacker could exploit this vulnerability by sending malicious IKEv1 traffic to an affected device. The attacker does not need valid credentials to authenticate the VPN session, nor does the attacker's source address need to match a peer statement in the crypto map applied to the ingress interface of the affected device. An exploit could allow the attacker to exhaust system memory resources, leading to a reload of an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ftd-ikev1-dos This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 18 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication . Affected Products o Vulnerable Products This vulnerability affects the following Cisco products when running a vulnerable release of Cisco ASA Software or Cisco FTD Software on interfaces that have the IKEv1 protocol enabled for LAN-to-LAN or Remote Access IPsec VPN connections: Adaptive Security Virtual Appliance (ASAv) Firepower 2100 Series Appliances Firepower Threat Defense Virtual (FTDv) The IKEv1 protocol is disabled in Cisco ASA Software and FTD Software by default. Note: IKE version 2 (IKEv2)-based VPN connections are not affected by this vulnerability. For information about which Cisco ASA Software and FTD Software releases are vulnerable, see the Fixed Software section of this advisory. Determine Whether the IKEv1 Protocol Is Configured To enable the IKEv1 protocol for LAN-to-LAN or Remote Access IPsec VPN connections, two conditions need to be true: 1. An Internet Security Association and Key Management Protocol (ISAKMP) policy for IKEv1 needs to be configured. 2. IKEv1 needs to be enabled on at least one interface. Administrators can use the show running-config crypto ikev1 command to determine whether an ISAKMP policy for IKEv1 is configured and whether IKEv1 is enabled on at least one interface. The following example shows the output of the show running-config crypto ikev1 command on a device that has ISAKMP policy 1 configured for IKEv1 and that has IKEv1 enabled on the outside interface: ciscoasa# show running-config crypto ikev1 crypto ikev1 enable outside crypto ikev1 policy 1 authentication pre-share encryption aes hash sha group 2 lifetime 86400 Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: 3000 Series Industrial Security Appliances (ISAs) ASA 1000V Cloud Firewall ASA 5505 Series Adaptive Security Appliances ASA 5500-X Series Firewalls ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers Firepower 1000 Series Firepower 4100 Series Firepower 9300 ASA Security Module Firepower 9300 Security Appliances Firepower Management Center (FMC) Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases In the following tables, the left column lists releases of Cisco ASA Software, Cisco FMC Software, or Cisco FTD Software. The center column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. The right column indicates whether a release is affected by any of the vulnerabilities described in this bundle and which release includes fixes for those vulnerabilities. Cisco ASA Software Cisco ASA First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Not vulnerable. Migrate to a fixed release. 9.4 ^1 9.4 ^1 Not vulnerable. Migrate to a fixed release. 9.5 ^1 Not vulnerable. Migrate to a fixed release. 9.6 Not vulnerable. 9.6.4.34 9.7 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.8 9.8.3.26 9.8.4.10 9.9 9.9.2.47 Migrate to a fixed release. 9.10 9.10.1.17 9.10.1.30 9.12 9.12.2 9.12.2.5 9.13 Not vulnerable. Not vulnerable. 1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco FTD Software Cisco FTD First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Not vulnerable. Migrate to a fixed release. 6.1.0 ^1 6.1.0 Not vulnerable. Migrate to a fixed release. 6.2.0 Migrate to a fixed Migrate to a fixed release. release. 6.2.1 Migrate to a fixed Migrate to a fixed release. release. 6.2.2 Migrate to a fixed Migrate to a fixed release. release. 6.2.3 6.2.3.11 Migrate to a fixed release. 6.3.0 6.3.0.2 6.4.0.4 6.4.0 Not vulnerable. 6.4.0.4 6.5.0 Not vulnerable. Not vulnerable. 1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. To upgrade to a fixed release of Cisco FTD Software, customers can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy. For devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during the resolution of a Cisco TAC support case. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ftd-ikev1-dos Revision History o +---------+--------------------------+---------+--------+-----------------+ | Version | Description | Section | Status | Date | +---------+--------------------------+---------+--------+-----------------+ | 1.0 | Initial public release. | - | Final | 2019-October-02 | +---------+--------------------------+---------+--------+-----------------+ ================================================================================== Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software OSPF LSA Processing Denial of Service Vulnerability Priority: High Advisory ID: cisco-sa-20191002-asa-ospf-lsa-dos First Published: 2019 October 2 16:00 GMT Version 1.0: Final Workarounds: No workarounds availableCisco Bug IDs: CSCvp49790 CVE-2019-12676 CWE-20 CVSS Score: 7.4 AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X Summary o A vulnerability in the Open Shortest Path First (OSPF) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software improperly parses certain options in OSPF link-state advertisement (LSA) type 11 packets. An attacker could exploit this vulnerability by sending a crafted LSA type 11 OSPF packet to an affected device. A successful exploit could allow the attacker to cause a reload of the affected device, resulting in a DoS condition for client traffic that is traversing the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ospf-lsa-dos This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 18 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication . Affected Products o Vulnerable Products This vulnerability affects Cisco products that are running a vulnerable release of Cisco ASA Software or Cisco FTD Software that is configured to support OSPF routing. Determine Whether OSPF Routing Is Configured on an ASA To determine whether OSPF routing is configured on an ASA, administrators can use the show ospf privileged mode command. If no output is returned, OSPF routing is not configured. In the following example, the device is configured for OSPF routing: asa# show ospf Routing Process "ospf 2" with ID 10.1.89.2 and Domain ID 0.0.0.2 Supports only single TOS(TOS0) routes Supports opaque LSA . . . Determine Whether OSPF Routing Is Configured on FTD To determine whether OSPF routing is configured on FTD, administrators can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), choose Devices > Device Management , select the device of interest, and then choose Routing > OSPF . If either Process 1 or Process 2 has a check mark, OSPF is enabled on the device. For devices that are managed by using Cisco Firepower Device Manager (FDM), choose Device > Advanced Configuration > View Configuration > Smart CLI > Routing . If there is an object with the type of OSPF , then OSPF is enabled on the device. For information about which Cisco ASA Software and FTD Software releases are vulnerable, see the Fixed Software section of this advisory. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect Cisco FMC Software. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases In the following tables, the left column lists releases of Cisco ASA Software, Cisco FMC Software, or Cisco FTD Software. The center column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. The right column indicates whether a release is affected by any of the vulnerabilities described in this bundle and which release includes fixes for those vulnerabilities. Cisco ASA Software Cisco ASA First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Migrate to a fixed Migrate to a fixed release. 9.4 ^1 release. 9.4 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.5 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.6 9.6.4.34 9.6.4.34 9.7 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.8 9.8.4.8 9.8.4.10 9.9 Migrate to a fixed Migrate to a fixed release. release. 9.10 9.10.1.27 9.10.1.30 9.12 9.12.2.1 9.12.2.5 9.13 Not vulnerable. Not vulnerable. 1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco FTD Software Cisco FTD First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Migrate to a fixed Migrate to a fixed release. 6.1.0 ^1 release. 6.1.0 Migrate to a fixed Migrate to a fixed release. release. 6.2.0 Migrate to a fixed Migrate to a fixed release. release. 6.2.1 Migrate to a fixed Migrate to a fixed release. release. 6.2.2 Migrate to a fixed Migrate to a fixed release. release. 6.2.3 Migrate to a fixed Migrate to a fixed release. release. 6.3.0 6.3.0.4 6.4.0.4 6.4.0 6.4.0.4 6.4.0.4 6.5.0 Not vulnerable. Not vulnerable. 1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. To upgrade to a fixed release of Cisco FTD Software, customers can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy. For devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ospf-lsa-dos Revision History o +---------+--------------------------+---------+--------+-----------------+ | Version | Description | Section | Status | Date | +---------+--------------------------+---------+--------+-----------------+ | 1.0 | Initial public release. | - | Final | 2019-October-02 | +---------+--------------------------+---------+--------+-----------------+ ================================================================================== Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SIP Inspection Denial of Service Vulnerability Priority: High Advisory ID: cisco-sa-20191002-asa-ftd-sip-dos First Published: 2019 October 2 16:00 GMT Version 1.0: Final Workarounds: No workarounds availableCisco Bug IDs: CSCvp45882 CVE-2019-12678 CWE-191 CVSS Score: 8.6 AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X Summary o A vulnerability in the Session Initiation Protocol (SIP) inspection module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper parsing of SIP messages. An attacker could exploit this vulnerability by sending a malicious SIP packet through an affected device. A successful exploit could allow the attacker to trigger an integer underflow, causing the software to try to read unmapped memory and resulting in a crash. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ftd-sip-dos This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 18 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication . Affected Products o Vulnerable Products This vulnerability affects Cisco products that are running a vulnerable release of Cisco ASA Software or Cisco FTD Software and that have the SIP inspection feature enabled. SIP inspection is enabled by default in Cisco ASA Software and FTD Software. For detailed information about the default settings for application inspection policies, refer to the Cisco ASA Series Firewall CLI Configuration Guide . For information about which Cisco ASA Software and FTD Software releases are vulnerable, see the Fixed Software section of this advisory. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect Cisco Firepower Management Center (FMC) Software. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases In the following tables, the left column lists releases of Cisco ASA Software, Cisco FMC Software, or Cisco FTD Software. The center column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. The right column indicates whether a release is affected by any of the vulnerabilities described in this bundle and which release includes fixes for those vulnerabilities. Cisco ASA Software Cisco ASA First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Migrate to a fixed Migrate to a fixed release. 9.4 ^1 release. 9.4 ^1 9.4.4.37 Migrate to a fixed release. 9.5 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.6 9.6.4.34 9.6.4.34 9.7 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.8 9.8.4.7 9.8.4.10 9.9 9.9.2.56 Migrate to a fixed release. 9.10 9.10.1.27 9.10.1.30 9.12 9.12.2.1 9.12.2.5 9.13 Not vulnerable. Not vulnerable. 1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco FTD Software Cisco FTD First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Migrate to a fixed Migrate to a fixed release. 6.1.0 ^1 release. 6.1.0 Migrate to a fixed Migrate to a fixed release. release. 6.2.0 Migrate to a fixed Migrate to a fixed release. release. 6.2.1 Migrate to a fixed Migrate to a fixed release. release. 6.2.2 Migrate to a fixed Migrate to a fixed release. release. 6.2.3 6.2.3.15 Migrate to a fixed release. 6.3.0 6.3.0.4 6.4.0.4 6.4.0 6.4.0.4 6.4.0.4 6.5.0 Not vulnerable. Not vulnerable. 1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. To upgrade to a fixed release of Cisco FTD Software, customers can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy. For devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ftd-sip-dos Revision History o +---------+--------------------------+---------+--------+-----------------+ | Version | Description | Section | Status | Date | +---------+--------------------------+---------+--------+-----------------+ | 1.0 | Initial public release. | - | Final | 2019-October-02 | +---------+--------------------------+---------+--------+-----------------+ ================================================================================== Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN CPU Denial of Service Vulnerability Priority: Medium Advisory ID: cisco-sa-20191002-asa-ftd-dos First Published: 2019 October 2 16:00 GMT Version 1.0: Final Workarounds: No workarounds availableCisco Bug IDs: CSCvp76944 CVE-2019-12698 CWE-400 CVSS Score: 5.3 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:X/RL:X/RC:X Summary o A vulnerability in the WebVPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause increased CPU utilization on an affected device. The vulnerability is due to excessive processing load for a specific WebVPN HTTP page request. An attacker could exploit this vulnerability by sending multiple WebVPN HTTP page load requests for a specific URL. A successful exploit could allow the attacker to increase CPU load on the device, resulting in a denial of service (DoS) condition, which could cause traffic to be delayed through the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ftd-dos Affected Products o Vulnerable Products This vulnerability affects Cisco products running Cisco ASA Software or FTD Software when configured for WebVPN. For information about which Cisco ASA Software and FTD Software releases are vulnerable, see the Fixed Software section of this advisory. Determine If WebVPN Is Enabled To determine if the WebVPN service is enabled on a device, administrators can use the show running-config webvpn privileged EXEC command and refer to the output of the command. The following example shows the output of the command for a device that has the WebVPN service enabled: ciscoasa# show running-config webvpn . . . webvpn enable interface_name . . . Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: Firepower Management Center (FMC) Firepower Management Center 1000 Indicators of Compromise o During active exploitation of this vulnerability, administrators may notice increased CPU usage by the Unicorn Proxy Thread process. This can be checked by issuing the show processes cpu-usage non-zero command at the CLI and reviewing the statistics for the Unicorn Proxy Thread process. ciscoasa# show processes cpu-usage non-zero Hardware: ASA5516 Cisco Adaptive Security Appliance Software Version 9.8(2)38 ASLR enabled, text region 7f313ea71000-7f3142d61bb4 PC Thread 5Sec 1Min 5Min Process 0x00007f3140f35888 0x00002aaacfaa8b20 7.7% 5.0% 3.0% Unicorn Proxy Thread - - 9.5% 1.9% 0.8% DATAPATH-0-2044 - - 3.6% 1.4% 0.8% DATAPATH-1-2045 It should be noted that this output is an example. Administrators would need to compare the output values from their device(s) to baseline values from normal device operation. Workarounds o There are no workarounds that address this vulnerability. It is possible that during active exploitation, an administrator could mitigate the attack by implementing an access control list (ACL) to block the incoming requests or perform rate limiting. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases In the following table(s), the left column lists releases of Cisco ASA Software, Cisco FMC Software, or Cisco FTD Software. The right column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. Cisco ASA Software Cisco ASA Software Release First Fixed Release for This Vulnerability Earlier than 9.4 ^1 Migrate to a fixed release. 9.4 ^1 Migrate to a fixed release. 9.5 ^1 Migrate to a fixed release. 9.6 9.6.4.31 9.7 ^1 Migrate to a fixed release. 9.8 9.8.4.9 9.9 9.9.2.56 9.10 9.10.1.30 9.12 9.12.2.9 9.13 9.13.1 1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco FTD Software Cisco FTD Software Release First Fixed Release for This Vulnerability Earlier than 6.1.0 ^1 Migrate to a fixed release. 6.1.0 Migrate to a fixed release. 6.2.0 Migrate to a fixed release. 6.2.1 Migrate to a fixed release. 6.2.2 Migrate to a fixed release. 6.2.3 6.2.3.15 6.3.0 6.3.0.5 6.4.0 6.4.0.6 6.5.0 Not vulnerable. 1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. To upgrade to a fixed release of Cisco FTD Software, customers can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy. For devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o Cisco would like to thank Qian Chen of Qihoo 360 Nirvan Team for reporting this vulnerability. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ftd-dos Revision History o +---------+--------------------------+---------+--------+-----------------+ | Version | Description | Section | Status | Date | +---------+--------------------------+---------+--------+-----------------+ | 1.0 | Initial public release. | - | Final | 2019-October-02 | +---------+--------------------------+---------+--------+-----------------+ ================================================================================== Cisco Adaptive Security Appliance and Firepower Threat Defense Software WebVPN Cross-Site Scripting Vulnerability Priority: Medium Advisory ID: cisco-sa-20191002-asa-xss First Published: 2019 October 2 16:00 GMT Version 1.0: Final Workarounds: No workarounds availableCisco Bug IDs: CSCvp33341 CVE-2019-12695 CWE-79 CVSS Score: 6.1 AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X Summary o A vulnerability in the Clientless SSL VPN (WebVPN) portal of Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-xss Affected Products o Vulnerable Products This vulnerability affects Cisco products running Cisco ASA Software or FTD Software when configured for WebVPN. For information about which Cisco ASA Software and FTD Software releases are vulnerable, see the Fixed Software section of this advisory. Determine If WebVPN Is Enabled To determine if the WebVPN service is enabled on a device, administrators can use the show running-config webvpn privileged EXEC command and refer to the output of the command. The following example shows the output of the command for a device that has the WebVPN service enabled: ciscoasa# show running-config webvpn . . . webvpn enable interface_name . . . Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: Firepower Management Center (FMC) Firepower Management Center 1000 Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases In the following table(s), the left column lists releases of Cisco ASA Software, Cisco FMC Software, or Cisco FTD Software. The right column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. Cisco ASA Software Cisco ASA Software Release First Fixed Release for This Vulnerability Earlier than 9.4 ^1 Migrate to a fixed release. 9.4 ^1 Migrate to a fixed release. 9.5 ^1 Migrate to a fixed release. 9.6 9.6.4.31 9.7 ^1 Migrate to a fixed release. 9.8 9.8.4.9 9.9 9.9.2.56 9.10 9.10.1.30 9.12 9.12.2.9 9.13 9.13.1 1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco FTD Software Cisco FTD Software Release First Fixed Release for This Vulnerability Earlier than 6.1.0 ^1 Migrate to a fixed release. 6.1.0 Migrate to a fixed release. 6.2.0 Migrate to a fixed release. 6.2.1 Migrate to a fixed release. 6.2.2 Migrate to a fixed release. 6.2.3 6.2.3.15 6.3.0 6.3.0.5 6.4.0 6.4.0.6 6.5.0 Not vulnerable. 1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. To upgrade to a fixed release of Cisco FTD Software, customers can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy. For devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o Cisco would like to thank Qingtang Zheng from CodeSafe Team of Legendsec at Qi'anxin Group for reporting this vulnerability. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Action Links for This Advisory o Understanding Cross-Site Scripting (XSS) Threat Vectors Related to This Advisory o Cross-Site Scripting URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-xss Revision History o +---------+--------------------------+---------+--------+-----------------+ | Version | Description | Section | Status | Date | +---------+--------------------------+---------+--------+-----------------+ | 1.0 | Initial public release. | - | Final | 2019-October-02 | +---------+--------------------------+---------+--------+-----------------+ =============================================================================== Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software OSPF LSA Processing Denial of Service Vulnerability Priority: High Advisory ID: cisco-sa-20191002-asa-ospf-lsa-dos First Published: 2019 October 2 16:00 GMT Last Updated: 2019 October 18 18:18 GMT Version 1.2: Final Workarounds: No workarounds availableCisco Bug IDs: CSCvp49790 CVE-2019-12676 CWE-20 CVSS Score: 7.4 AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X Summary o A vulnerability in the Open Shortest Path First (OSPF) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software improperly parses certain options in OSPF link-state advertisement (LSA) type 11 packets. An attacker could exploit this vulnerability by sending a crafted LSA type 11 OSPF packet to an affected device. A successful exploit could allow the attacker to cause a reload of the affected device, resulting in a DoS condition for client traffic that is traversing the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ospf-lsa-dos This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 18 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication . Affected Products o Vulnerable Products This vulnerability affects Cisco products that are running a vulnerable release of Cisco ASA Software or Cisco FTD Software that is configured to support OSPF routing. Determine Whether OSPF Routing Is Configured on an ASA To determine whether OSPF routing is configured on an ASA, administrators can use the show ospf privileged mode command. If no output is returned, OSPF routing is not configured. In the following example, the device is configured for OSPF routing: asa# show ospf Routing Process "ospf 2" with ID 10.1.89.2 and Domain ID 0.0.0.2 Supports only single TOS(TOS0) routes Supports opaque LSA . . . Determine Whether OSPF Routing Is Configured on FTD To determine whether OSPF routing is configured on FTD, administrators can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), choose Devices > Device Management , select the device of interest, and then choose Routing > OSPF . If either Process 1 or Process 2 has a check mark, OSPF is enabled on the device. For devices that are managed by using Cisco Firepower Device Manager (FDM), choose Device > Advanced Configuration > View Configuration > Smart CLI > Routing . If there is an object with the type of OSPF , then OSPF is enabled on the device. For information about which Cisco ASA Software and FTD Software releases are vulnerable, see the Fixed Software section of this advisory. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect Cisco FMC Software. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases In the following tables, the left column lists releases of Cisco ASA Software, Cisco FMC Software, or Cisco FTD Software. The center column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. The right column indicates whether a release is affected by any of the vulnerabilities described in this bundle and which release includes fixes for those vulnerabilities. Cisco ASA Software Cisco ASA First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Migrate to a fixed Migrate to a fixed release. 9.4 ^1 release. 9.4 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.5 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.6 9.6.4.34 9.6.4.34 9.7 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.8 9.8.4.8 9.8.4.10 9.9 9.9.2.59 Migrate to a fixed release. 9.10 9.10.1.27 9.10.1.30 9.12 9.12.2.1 9.12.2.5 9.13 Not vulnerable. Not vulnerable. 1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco FTD Software Cisco FTD First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Migrate to a fixed Migrate to a fixed release. 6.1.0 ^1 release. 6.1.0 Migrate to a fixed Migrate to a fixed release. release. 6.2.0 Migrate to a fixed Migrate to a fixed release. release. 6.2.1 Migrate to a fixed Migrate to a fixed release. release. 6.2.2 Migrate to a fixed Migrate to a fixed release. release. 6.2.3 6.2.3.15 Migrate to a fixed release. 6.3.0 6.3.0.4 6.4.0.4 6.4.0 6.4.0.4 6.4.0.4 6.5.0 Not vulnerable. Not vulnerable. 1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. To upgrade to a fixed release of Cisco FTD Software, customers can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy. For devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-ospf-lsa-dos Revision History o +---------+------------------------+-----------+--------+-----------------+ | Version | Description | Section | Status | Date | +---------+------------------------+-----------+--------+-----------------+ | 1.2 | Updated FTD Fixed | Fixed | Final | 2019-October-18 | | | Release table. | Software | | | +---------+------------------------+-----------+--------+-----------------+ | 1.1 | Updated ASA Fixed | Fixed | Final | 2019-October-04 | | | Release table. | Software | | | +---------+------------------------+-----------+--------+-----------------+ | 1.0 | Initial public | - | Final | 2019-October-02 | | | release. | | | | +---------+------------------------+-----------+--------+-----------------+ =============================================================================== Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software FTP Inspection Denial of Service Vulnerability Priority: High Advisory ID: cisco-sa-20191002-asa-dos First Published: 2019 October 2 16:00 GMT Last Updated: 2019 October 18 18:18 GMT Version 1.1: Final Workarounds: No workarounds availableCisco Bug IDs: CSCvo83169 CVE-2019-12673 CWE-119 CVSS Score: 8.6 AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X Summary o A vulnerability in the FTP inspection engine of Cisco Adaptive Security (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of FTP data. An attacker could exploit this vulnerability by sending malicious FTP traffic through an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-dos This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 18 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication . Affected Products o Vulnerable Products This vulnerability affects Cisco products if they are running a vulnerable release of Cisco ASA Software or Cisco FTD Software that is configured to perform FTP inspection. FTP inspection is enabled by default in Cisco FTD Software. For detailed information about the default settings for application inspection policies, see the Cisco ASA Series Firewall CLI Configuration Guide . Determine Whether FTP Inspection Is Enabled on an ASA To determine whether FTP inspection is enabled on an ASA, administrators can use the show running-config policy-map command and then the show running-config service-policy command. First use the show running-config policy-map command, and check whether the inspect ftp command is present in at least one policy map. In the following output, the global-policy policy map includes the inspect ftp command: asa# show running-config policy-map ! policy-map global_policy class inspection_default inspect ip-options inspect netbios inspect rtsp inspect sunrpc inspect tftp inspect xdmcp inspect dns preset_dns_map inspect ftp inspect h323 h225 Next use the show running-config service-policy command, and check whether the policy map is applied, either globally or to a single interface. The following output shows the global-policy policy map applied globally: asa# show running-config service-policy service-policy global_policy global If the policy map that contains the inspect ftp command is applied globally or to an interface, FTP inspection is enabled. Determine Whether FTP Inspection Is Enabled on FTD To determine whether FTP inspection is enabled on FTD, administrators can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), open Cisco FMC, choose Policies > Access Control > Malware & File , and then choose an access control rule. Click the File Policy tab to view detailed information about file policies that are associated with the rule. For devices that are managed by using Cisco Firepower Device Manager (FDM), open Cisco FDM, choose Policies > Access Control , and then choose an access control rule. Click the File Policy tab to view detailed information about file policies that are associated with the rule. Note that Cisco FDM supports predefined file policies only; administrators cannot create file policies for access control rules. For information about which Cisco ASA Software and FTD Software releases are vulnerable, see the Fixed Software section of this advisory. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect Cisco FMC Software. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases In the following tables, the left column lists releases of Cisco ASA Software, Cisco FMC Software, or Cisco FTD Software. The center column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. The right column indicates whether a release is affected by any of the vulnerabilities described in this bundle and which release includes fixes for those vulnerabilities. Cisco ASA Software Cisco ASA First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Migrate to a fixed Migrate to a fixed release. 9.4 ^1 release. 9.4 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.5 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.6 9.6.4.34 9.6.4.34 9.7 ^1 Migrate to a fixed Migrate to a fixed release. release. 9.8 9.8.4.10 9.8.4.10 9.9 9.9.2.56 Migrate to a fixed release. 9.10 9.10.1.30 9.10.1.30 9.12 9.12.2.5 9.12.2.5 9.13 Not vulnerable. Not vulnerable. 1. Cisco ASA Software releases 9.5 and earlier, as well as Release 9.7, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco FTD Software Cisco FTD First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories Earlier than Migrate to a fixed Migrate to a fixed release. 6.1.0 ^1 release. 6.1.0 Migrate to a fixed Migrate to a fixed release. release. 6.2.0 Migrate to a fixed Migrate to a fixed release. release. 6.2.1 Migrate to a fixed Migrate to a fixed release. release. 6.2.2 Migrate to a fixed Migrate to a fixed release. release. 6.2.3 6.2.3.15 Migrate to a fixed release. 6.3.0 6.3.0.5 (late 6.4.0.4 October 2019) 6.4.0 6.4.0.4 6.4.0.4 6.5.0 Not vulnerable. Not vulnerable. 1. Cisco FMC and FTD Software releases 6.0.1 and earlier have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for this vulnerability. To upgrade to a fixed release of Cisco FTD Software, customers can do one of the following: For devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy. For devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20191002-asa-dos Revision History o +---------+------------------------+-----------+--------+-----------------+ | Version | Description | Section | Status | Date | +---------+------------------------+-----------+--------+-----------------+ | 1.1 | Updated FTD Fixed | Fixed | Final | 2019-October-18 | | | Release table. | Software | | | +---------+------------------------+-----------+--------+-----------------+ | 1.0 | Initial public | - | Final | 2019-October-02 | | | release. | | | | +---------+------------------------+-----------+--------+-----------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXazi/2aOgq3Tt24GAQjapw/9GkCpsgw39e+iG4f/4zBVAZ0+Wd34nrL+ /cQo+7nQKdsC3+pcUykhwesiehMqEBo3xmAOHLUDDxJIr2DgWAsmsGh+gWZogJuu SFWtesYPq+h5L5oLoQ5DfJ7L8V3/fTsky03GjatI/K8DOqR6IN7X2MRsJ59ya5dE NLb5GpaUmHo4NI4iPIrJtZXSiCj0Ng9Q/CFyi3s/6llLT7FS7X6KHdi8/kyIvQx1 Lxis9v3K/u3GD33yEfqP/53EdpDdObU8m8EfT2cTjF+xlg3k9otCpFYTBi9OYqF1 WplhQi2tkZTGjLtoUjt71weur381zNuxwghXCf0EMvMQZjX7RgC9N1A6oubotENq dEdZRZ/LqmQw1mlo4qGaSTPk5OY9zz2UGxyCNb2lRMfeI1Bak1cyCq8r17tdl4R2 C94iieNpn/aGEVXmfcJvLmGmZUNxMunMDI51KXSiMWYmFLPfZg21VRFHu+nOHzoP /D2X0wALVaM8FErS/G2elsxjYnNo6ycHHC/roXlAfM1kKSqUWy57CJ5O0JtdzGl0 gf+rOOKtPzEVqJ+Hf7mPIntuQ3W5ZAn0QMHrNaPvNCFY5LugP30lcvU2YVG7qPPl uUVO+qNi6/HxG+C7CujFw0+m8iGa/8TviAZUlCaYjEeq+KkGosTKjaaNKc7Wge9w /oZZ91d6qzY= =aLTG -----END PGP SIGNATURE-----