SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Firewall)  >   Cisco ASA Vendors:   Cisco
Cisco ASA ICV Verification Flaw Lets Remote Users Modify IPSec/IKEv2 Packet Contents
SecurityTracker Alert ID:  1032595
SecurityTracker URL:  http://securitytracker.com/id/1032595
CVE Reference:   CVE-2015-4550   (Links to External Site)
Date:  Jun 17 2015
Impact:   Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.3(3), 9.4(1.1); possibly other versions
Description:   A vulnerability was reported in Cisco ASA. A remote user can modify data on the target system.

The AES-GCM code in the Cavium Networks cryptographic module component does not validate the integrity check value (ICV) of IPSec and IKEv2 packets. A remote user that can conduct a man-in-the-middle attack can exploit this flaw to modify the contents of encrypted IPSec or IKEv2 packets without detection by the system.

SSL/TLS traffic originating from or destined to the target device is not affected.

The vendor has assigned bug ID CSCuu66218 to this vulnerability.

Impact:   A remote user with the ability to conduct a man-in-the-middle attack can modify the contents of encrypted IPSec or IKEv2 packets without detection by the system.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

http://tools.cisco.com/security/center/viewAlert.x?alertId=39366

Vendor URL:  tools.cisco.com/security/center/viewAlert.x?alertId=39366 (Links to External Site)
Cause:   Authentication error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC