A vulnerability in the WebVPN service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper management of authenticated sessions in the WebVPN portal. An attacker could exploit this vulnerability by authenticating with valid credentials and accessing a specific URL in the WebVPN portal. A successful exploit could allow the attacker to cause the device to reload, resulting in a temporary DoS condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-dos | Vendor Advisory |
http://www.securityfocus.com/bid/108157 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Information
Published : 2019-05-03 08:29
Updated : 2020-10-07 11:28
NVD link : CVE-2019-1693
Mitre link : CVE-2019-1693
JSON object : View
CWE
Products Affected
cisco
- asa_5510
- asa_5540
- adaptive_security_appliance_software
- asa_5550
- asa_5545-x
- asa_5580
- asa_5520
- firepower_threat_defense
- asa_5505
- asa_5525-x
- asa_5515-x
- asa_5512-x
- asa_5585-x
- asa_5555-x