CVE-2018-0296 Detail
Current Description
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques. The vulnerability is due to lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. This vulnerability applies to IPv4 and IPv6 HTTP traffic. This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029.
Source:
MITRE
Description Last Modified:
06/07/2018
View Analysis Description
Analysis Description
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques. The vulnerability is due to lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. This vulnerability applies to IPv4 and IPv6 HTTP traffic. This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029.
Source:
MITRE
Description Last Modified:
06/07/2018
Impact
CVSS v3.0 Severity and Metrics:
Base Score:
7.5 HIGH
Vector:
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
(V3 legend)
Impact Score:
3.6
Exploitability Score:
3.9
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High
CVSS v2.0 Severity and Metrics:
Base Score:
5.0 MEDIUM
Vector:
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
(V2 legend)
Impact Subscore:
2.9
Exploitability Subscore:
10.0
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (AU):
None
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
Partial
Additional Information:
Allows disruption of service
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.
Change History
4 change records found
- show changes
Initial Analysis -
7/23/2018 11:17:04 AM
Action |
Type |
Old Value |
New Value |
Added |
CPE Configuration |
|
Record truncated, showing 500 of 1008 characters.
View Entire Change Record
OR
*cpe:2.3:a:cisco:adaptive_security_appliance_software:8.1\(2.5\):*:*:*:*:*:*:*
*cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* versions from (including) 9.1 up to (excluding) 9.1.7.29
*cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* versions from (including) 9.2 up to (excluding) 9.2.4.33
*cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* versions from (including) 9.3 up to (excluding) 9.4.4.18
*cpe:2.3:a:c |
Added |
CPE Configuration |
|
Record truncated, showing 500 of 520 characters.
View Entire Change Record
OR
*cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* versions from (including) 6.0 up to (excluding) 6.1.0
*cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* versions from (including) 6.2.1 up to (excluding) 6.2.2.3
*cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:firepower_threat_defense:6.2.3-85.02:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:firepower_threat_defense:6.2.3-851:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:firepower_threat_defense:6 |
Added |
CVSS V2 |
|
(AV:N/AC:L/Au:N/C:N/I:N/A:P) |
Added |
CVSS V3 |
|
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Added |
CWE |
|
CWE-20 |
Changed |
Reference Type |
http://www.securityfocus.com/bid/104612 No Types Assigned |
http://www.securityfocus.com/bid/104612 Third Party Advisory, VDB Entry |
Changed |
Reference Type |
http://www.securitytracker.com/id/1041076 No Types Assigned |
http://www.securitytracker.com/id/1041076 Third Party Advisory, VDB Entry |
Changed |
Reference Type |
https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01 No Types Assigned |
https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01 Third Party Advisory, US Government Resource |
Changed |
Reference Type |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-asaftd No Types Assigned |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-asaftd Vendor Advisory |
Changed |
Reference Type |
https://www.exploit-db.com/exploits/44956/ No Types Assigned |
https://www.exploit-db.com/exploits/44956/ Exploit, Third Party Advisory, VDB Entry |
CVE Modified by MITRE -
7/5/2018 9:29:01 PM
Action |
Type |
Old Value |
New Value |
Added |
Reference |
|
http://www.securityfocus.com/bid/104612 [No Types Assigned] |
Added |
Reference |
|
https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01 [No Types Assigned] |
CVE Modified by MITRE -
6/30/2018 9:29:01 PM
Action |
Type |
Old Value |
New Value |
Added |
Reference |
|
https://www.exploit-db.com/exploits/44956/ [No Types Assigned] |
CVE Modified by MITRE -
6/13/2018 9:29:31 PM
Action |
Type |
Old Value |
New Value |
Added |
Reference |
|
http://www.securitytracker.com/id/1041076 [No Types Assigned] |
Quick Info
CVE Dictionary Entry:
CVE-2018-0296
NVD Published Date:
06/07/2018
NVD Last Modified:
07/23/2018
|