cisco adaptive_security_appliance 不充分的会话过期机制

CVE编号

CVE-2021-1501

利用情况

暂无

补丁情况

N/A

披露时间

2021-04-30
漏洞描述
A vulnerability in the SIP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a crash and reload of an affected device, resulting in a denial of service (DoS) condition.The vulnerability is due to a crash that occurs during a hash lookup for a SIP pinhole connection. An attacker could exploit this vulnerability by sending crafted SIP traffic through an affected device. A successful exploit could allow the attacker to cause a crash and reload of the affected device.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 cisco adaptive_security_appliance * From
(including)
9.10
Up to
(excluding)
9.12.4.18
运行在以下环境
应用 cisco adaptive_security_appliance * From
(including)
9.13
Up to
(excluding)
9.13.1.21
运行在以下环境
应用 cisco adaptive_security_appliance * From
(including)
9.14
Up to
(excluding)
9.14.2.13
运行在以下环境
应用 cisco adaptive_security_appliance * From
(including)
9.15
Up to
(excluding)
9.15.1.15
运行在以下环境
应用 cisco adaptive_security_appliance * From
(including)
9.8
Up to
(excluding)
9.8.4.34
运行在以下环境
应用 cisco adaptive_security_appliance * From
(including)
9.9
Up to
(excluding)
9.9.2.85
运行在以下环境
应用 cisco firepower_threat_defense * From
(including)
6.2.2
Up to
(excluding)
6.4.0.12
运行在以下环境
应用 cisco firepower_threat_defense * From
(including)
6.5.0
Up to
(excluding)
6.6.4
运行在以下环境
应用 cisco firepower_threat_defense * From
(including)
6.7.0
Up to
(excluding)
6.7.0.2
CVSS3评分
7.5
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-613 不充分的会话过期机制
NVD-CWE-noinfo
阿里云安全产品覆盖情况