

A valid SSL or TLS session is required to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic. Cisco Firepower 1010 NGFW Appliance, Desktop. ASA 5506-X with Firepower Threat Defense, 8GE, AC. See Product Migration Options section for details. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. Bar None Technologies carries the Cisco ASA5506-K9, designed for small or mid-size enterprise or branch offices, and is one of the Cisco ASA 5500-X. Cissco ASA5506X Firepower Threat Defense Chss,Subs HA Bundle. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. I am setting up an ASA 5506-X and having trouble getting ASDM to launch. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. 11-29-2017 07:40 AM - edited 02-21-2020 06:52 AM.

An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. x, Asa 5506-x Firmware, Asa 5506h-x and 7 moreĪ vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly.
