A vulnerability in the memory management of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management when connection rates are high. An attacker could exploit this vulnerability by opening a significant number of connections on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dos-Unk689XY | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
History
16 Aug 2023, 16:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* |
24 Oct 2022, 14:19
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-401 |
29 Oct 2021, 01:59
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.8
v3 : 7.5 |
CPE | cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5555-x_firmware:099.017\(001.220\):*:*:*:*:*:*:* cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5580_firmware:099.017\(015.050\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5512-x_firmware:099.017\(001.220\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5545-x_firmware:099.017\(001.211\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5585-x_firmware:099.017\(015.050\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5512-x_firmware:099.017\(015.050\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5545-x_firmware:099.017\(015.050\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5555-x_firmware:099.017\(015.050\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5580_firmware:099.017\(001.211\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5585-x_firmware:099.017\(001.220\):*:*:*:*:*:*:* cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5555-x_firmware:099.017\(001.211\):*:*:*:*:*:*:* cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5545-x_firmware:099.017\(001.220\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5512-x_firmware:009.014\(001.150\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5525-x_firmware:099.017\(015.050\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5585-x_firmware:009.014\(001.150\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5505_firmware:099.017\(001.220\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5585-x_firmware:099.017\(001.211\):*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5525-x_firmware:099.017\(001.211\):*:*:*:*:*:*:* cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5505_firmware:099.017\(015.050\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5515-x_firmware:099.017\(001.211\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5515-x_firmware:099.017\(015.050\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5580_firmware:099.017\(001.220\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5580_firmware:009.014\(001.150\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5515-x_firmware:009.014\(001.150\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5555-x_firmware:009.014\(001.150\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5515-x_firmware:099.017\(001.220\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5525-x_firmware:009.014\(001.150\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5505_firmware:099.017\(001.211\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5545-x_firmware:009.014\(001.150\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5525-x_firmware:099.017\(001.220\):*:*:*:*:*:*:* cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5505_firmware:009.014\(001.150\):*:*:*:*:*:*:* cpe:2.3:o:cisco:asa_5512-x_firmware:099.017\(001.211\):*:*:*:*:*:*:* |
|
CWE | CWE-400 | |
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dos-Unk689XY - Vendor Advisory |
27 Oct 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability in the memory management of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management when connection rates are high. An attacker could exploit this vulnerability by opening a significant number of connections on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. |
27 Oct 2021, 19:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-27 19:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-34792
Mitre link : CVE-2021-34792
CVE.ORG link : CVE-2021-34792
JSON object : View
Products Affected
cisco
- asa_5512-x
- asa_5545-x_firmware
- asa_5580_firmware
- asa_5525-x_firmware
- asa_5555-x_firmware
- asa_5512-x_firmware
- asa_5585-x_firmware
- asa_5525-x
- asa_5505
- asa_5505_firmware
- asa_5585-x
- asa_5545-x
- asa_5555-x
- asa_5580
- asa_5515-x
- asa_5515-x_firmware
- adaptive_security_appliance_software
- firepower_threat_defense