Check Point Reference: | CPAI-2018-0050 |
Date Published: | 1 Feb 2018 |
Severity: | Critical |
Last Updated: | Monday 28 November, 2022 |
Source: | |
Industry Reference: | CVE-2018-0101 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | 3000 Series Industrial Security Appliance (ISA) ASA 5500 Series Adaptive Security Appliances ASA 5500-X Series Next-Generation Firewalls ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers ASA 1000V Cloud Firewall Adaptive Security Virtual Appliance (ASAv) Firepower 2100 Series Security Appliance Firepower 4110 Security Appliance Firepower 9300 ASA Security Module Firepower Threat Defense Software (FTD) |
Vulnerability Description | A Remote Code Execution vulnerability exists in Cisco Adaptive Security Appliance software. The vulnerability is due to a failure on part of Internet Key Exchange code to handle UDP requests. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted UDP requests to a target server. Successful exploitation could allow the attacker to execute arbitrary code under the security context of system. |
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Cisco Protection Violation.
Attack Information: Cisco Adaptive Security Appliance Remote Code Execution (CVE-2018-0101)