Alert - Cisco ASA SNMP Remote Code Execution Vulnerability

Number: AL16-016
Date: 18 August 2016

Purpose

The purpose of this alert is to bring attention to a recently disclosed vulnerability VulnerabilityA flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations. in Cisco’s Adaptive Security Appliance.

Assessment

CCIRC is aware of a recently disclosed vulnerability in Cisco’s Adaptive Security Appliance.  Identified as CVE-2016-6366, this vulnerability in the SNMP code can allow a remote unauthenticated attacker to cause a reload of the affected system or to remotely execute code.  Exploit code has been released publicly.

A crafted IPv4 SNMP packet could cause a buffer overflow and the attacker must know the community string of the affected system in order to successfully exploit this vulnerability.

All versions of SNMP are affected by this vulnerability and software running on the following devices:

  • Cisco ASA 5500 Series Adaptive Security Appliances
  • Cisco ASA 5500-X Series Next-Generation Firewalls
  • Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
  • Cisco ASA 1000V Cloud Firewall
  • Cisco Adaptive Security Virtual Appliance (ASAv)
  • Cisco Firepower 9300 ASA Security Module
  • Cisco PIX Firewalls
  • Cisco Firewall Services Module (FWSM)

Suggested Action

Due to the potential risk presented by this vulnerability, CCIRC recommends that system administrators monitor for the developer released security fix. Workarounds have been published by the vendor.

References:

Date modified: