CVE-2019-1687

A vulnerability in the TCP proxy functionality for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error in TCP-based packet inspection, which could cause the TCP packet to have an invalid Layer 2 (L2)-formatted header. An attacker could exploit this vulnerability by sending a crafted TCP packet sequence to the targeted device. A successful exploit could allow the attacker to cause a DoS condition.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
ciscoCNA
6.8 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 48%
VendorProductVersion
ciscoadaptive_security_appliance_software
𝑥
< 9.4.4.34
ciscoadaptive_security_appliance_software
9.5 ≤
𝑥
< 9.6.4.25
ciscoadaptive_security_appliance_software
9.7 ≤
𝑥
< 9.8.4
ciscoadaptive_security_appliance_software
9.9 ≤
𝑥
< 9.9.2.50
ciscoadaptive_security_appliance_software
9.10 ≤
𝑥
< 9.10.1.17
ciscofirepower_threat_defense
6.0.0 ≤
𝑥
< 6.2.3.12
ciscofirepower_threat_defense
6.3.0 ≤
𝑥
< 6.3.0.3
𝑥
= Vulnerable software versions