![]() This vulnerability affects Cisco products if they are running a vulnerable release of Cisco ASA Software or FTD Software and have DNS inspection enabled.įor information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory.ĭetermine the DNS Inspection Configuration ![]() For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. This advisory is available at the following link: There are no workarounds that address this vulnerability. A successful exploit could allow the attacker to cause the device to stop responding, resulting in a DoS condition.Ĭisco has released software updates that address this vulnerability. An attacker could exploit this vulnerability by sending crafted DNS requests at a high rate to an affected device. This vulnerability is due to a lack of proper processing of incoming requests. A vulnerability in the DNS inspection handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service condition (DoS) on an affected device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |