
It has been reported that Cisco has discovered a vulnerability within two of its software. The vulnerability allows hackers to cause a denial of service (DoS), which is being actively exploited.
Specifically, the vulnerability was found in the Session Initiation Protocol (SIP) inspection engine of Cisco Adaptive Security Appliance (ASA) software and Cisco Firepower Threat Defense (FTD) software. An external party could cause an affected device to reload or trigger "high CPU' resulting in a DoS.
"The vulnerability is due to improper handling of SIP traffic. An attacker could exploit this vulnerability by sending SIP requests designed to specifically trigger this issue at a high rate across an affected device," Cisco stated on its security advisories and alerts page.
"Software updates that address this vulnerability are not yet available. There are no workarounds that address this vulnerability. Mitigation options that address this vulnerability are available," it further said.
Cisco however did not have any updates to fix the problem.
The vulnerability affects Cisco ASA software release 9.4 and later and Cisco FTD Software Release 6.0 and later if SIP inspection is enabled and the software is running on specific products.
Those products include 3000 Series Industrial Security Appliance (ISA), ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers and Adaptive Security Virtual Appliance (ASAv).
The vulnerability is also found on Firepower 2100 and 4100 Series Security Appliance, Firepower 9300 ASA Security Module and FTD Virtual (FTDv).
SIP inspection is enabled by default in both Cisco ASA Software and Cisco FTD Software.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.