6.5
CVE-2021-40125
- EPSS 0.33%
- Published 27.10.2021 19:15:08
- Last modified 21.11.2024 06:23:37
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. This vulnerability is due to improper control of a resource. An attacker with the ability to spoof a trusted IKEv2 site-to-site VPN peer and in possession of valid IKEv2 credentials for that peer could exploit this vulnerability by sending malformed, authenticated IKEv2 messages to an affected device. A successful exploit could allow the attacker to trigger a reload of the device.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Firepower Threat Defense Version < 6.4.0.13
Cisco ≫ Firepower Threat Defense Version >= 6.6.0 < 6.6.5
Cisco ≫ Firepower Threat Defense Version >= 6.7.0 < 6.7.0.3
Cisco ≫ Firepower Threat Defense Version >= 7.0.0 < 7.0.1
Cisco ≫ Adaptive Security Appliance Software Version >= 9.8.0 < 9.8.4.40
Cisco ≫ Adaptive Security Appliance Software Version >= 9.9.0 < 9.12.4.30
Cisco ≫ Adaptive Security Appliance Software Version >= 9.14.0 < 9.14.3.9
Cisco ≫ Adaptive Security Appliance Software Version >= 9.15.0 < 9.15.1.17
Cisco ≫ Adaptive Security Appliance Software Version >= 9.16.0 < 9.16.2
Cisco ≫ Asa 5512-x Firmware Version009.016(001.025)
Cisco ≫ Asa 5505 Firmware Version009.016(001.025)
Cisco ≫ Asa 5515-x Firmware Version009.016(001.025)
Cisco ≫ Asa 5525-x Firmware Version009.016(001.025)
Cisco ≫ Asa 5545-x Firmware Version009.016(001.025)
Cisco ≫ Asa 5555-x Firmware Version009.016(001.025)
Cisco ≫ Asa 5580 Firmware Version009.016(001.025)
Cisco ≫ Asa 5585-x Firmware Version009.016(001.025)
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.33% | 0.53 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 6.3 | 6.8 | 6.9 |
AV:N/AC:M/Au:S/C:N/I:N/A:C
|
psirt@cisco.com | 5.3 | 1.6 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-400 Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CWE-416 Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.