SSLv3 Padding Oracle On Downgraded Legacy Encryption in Cisco ASA Software (cisco-sa-20141015-poodle) (POODLE)
Medium Nessus Plugin ID 78750
The remote device is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as POODLE.
The remote Cisco ASA device is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. A MitM attacker can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. Note that all versions of ASA are affected; however, the workaround does not work for versions 8.0.x, 8.1.x, 9.0.x, and 9.1(1)x. Please refer to the advisory or contact the vendor for possible solutions.
Apply the workaround by disabling SSLv3 referenced in the Cisco bug ID CSCur23709, or contact the vendor.