Cisco ASA IP Packet CPU Exhaustion 拒绝服务漏洞
CVE编号
CVE-2018-0228利用情况
暂无补丁情况
N/A披露时间
2018-04-20漏洞描述
Cisco 3000 Series Industrial Security Appliances(ISR)等都是美国思科(Cisco)公司的安全防火墙设备。Adaptive Security Appliance(ASA)和Firepower Threat Defense(FTD)Software都是使用在Cisco不同安全设备中的防火墙软件。 多款Cisco产品中ASA和FTD Software的ingress flow创建功能存在输入验证漏洞,该漏洞源于程序未能正确的处理内部软件的锁定,导致其他的系统进程可以使CPU进入循环。远程攻击者可通过发送恶意的IP数据包流利用该漏洞造成拒绝服务(CPU资源耗尽)。解决建议
厂商已发布漏洞修复程序,请及时关注更新:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa2受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * | From (including) 9.1 | Up to (excluding) 9.1.7.20 | ||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * | From (including) 9.2 | Up to (excluding) 9.2.4.27 | ||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * | From (including) 9.3 | Up to (excluding) 9.4.4.13 | ||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * | From (including) 9.5 | Up to (excluding) 9.6.3.17 | ||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * | From (including) 9.7 | Up to (excluding) 9.7.1.16 | ||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * | From (including) 9.8 | Up to (excluding) 9.8.2.14 | ||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * | From (including) 9.9 | Up to (excluding) 9.9.1 | ||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | 98.1(12.187) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * | From (including) 6.0 | Up to (excluding) 6.1.0.6 | ||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * | From (including) 6.2.0 | Up to (excluding) 6.2.0.5 | ||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * | From (including) 6.2.1 | Up to (excluding) 6.2.2.2 |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 已更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 无
CWE-ID | 漏洞类型 |
CWE-667 | 加锁机制不恰当 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论