Cisco ASA Software Vulnerability - UPDATE

Purpose

CCIRC is releasing this Advisory UPDATE that contains additional information related to this vulnerability.

Assessment

The detection signatures referenced below are provided to aid organizations in detecting and mitigating malicious exploitation of this vulnerability.

IPS Sigs:
Cisco IPS : 7169-0 , Snort Sig: 36903 
Cisco IPS Signature is available in update S908

Suggested Action

Due to the elevated risk presented by this vulnerability, CCIRC recommends that system administrators test and deploy the vendor-released firmware updates to affected versions accordingly. CCIRC recommends that priority is given to these patches.

References:

Cisco ASA Software IKEv1 and IKEv2 Vulnerability Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike

Exodus: Execute My Packet
https://blog.exodusintel.com/2016/02/10/firewall-hacking/

Cisco ASA Software Vulnerability

Number: AV16-028
Date: 10 February 2016

Purpose

The purpose of this advisory is to bring attention to recent critical software update that addresses a disclosed vulnerability in Cisco ASA IKEv1 and IKEv2.

Assessment

CCIRC is aware of a recently disclosed vulnerability in Cisco ASA software IKEv1 and IKEv2.

This vulnerability could allow an unauthenticated remote attacker to execute code or cause a reload of the affected system. This is due to a buffer overflow that could be triggered in the current version of the software.

Affected Product :

  • Cisco ASA 5500 Series Adaptive Security Appliances
  • Cisco ASA 5500-X Series Next-Generation Firewalls
  • Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
  • Cisco ASA 1000V Cloud Firewall
  • Cisco Adaptive Security Virtual Applicate (ASAv)
  • Cisco Firepower 9300 ASA Security Module
  • Cisco ISA 3000 Industrial Security Appliance

Suggested Action

Due to the elevated risk presented by this vulnerability, CCIRC recommends that system administrators test and deploy the vendor-released firmware updates to affected versions accordingly. CCIRC recommends that priority is given to these patches.

References:

Cisco ASA Software IKEv1 and IKEv2 Vulnerability Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike

Date modified: