Cisco Adaptive Security Appliance Software IKEv2 Site-to-Site VPN Denial of Service (cisco-sa-asaftd-ikev2-dos-g4cmrr7C)

medium Nessus Plugin ID 160762

Synopsis

The remote device is missing a vendor-supplied security patch

Description

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. This vulnerability is due to improper control of a resource. An attacker with the ability to spoof a trusted IKEv2 site-to-site VPN peer and in possession of valid IKEv2 credentials for that peer could exploit this vulnerability by sending malformed, authenticated IKEv2 messages to an affected device

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvy93480

See Also

http://www.nessus.org/u?0c784582

https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74773

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy93480

Plugin Details

Severity: Medium

ID: 160762

File Name: cisco-sa-asaftd-ikev2-dos-g4cmrr7C-asa.nasl

Version: 1.7

Type: local

Family: CISCO

Published: 5/9/2022

Updated: 5/17/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2021-40125

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:adaptive_security_appliance_software

Required KB Items: Host/Cisco/ASA/model

Exploit Ease: No known exploits are available

Patch Publication Date: 10/27/2021

Vulnerability Publication Date: 10/27/2021

Reference Information

CVE: CVE-2021-40125

CWE: 416

CISCO-SA: cisco-sa-asaftd-ikev2-dos-g4cmrr7C

IAVA: 2021-A-0508-S

CISCO-BUG-ID: CSCvy93480