Loading HuntDB...

Cisco Adaptive Security Appliance (ASA) Software

237 Versions 71 CVEs

Versions

9.8.2.15

OTHER 22 CVEs

9.8.4.35

OTHER 26 CVEs

9.12.4.13

OTHER 26 CVEs

9.8.3.16

OTHER 24 CVEs

9.16.3.23

OTHER 27 CVEs

9.15.1.21

OTHER 29 CVEs

9.18.4.8

OTHER 16 CVEs

9.14.4

SEMANTIC 28 CVEs

9.12.4.35

OTHER 26 CVEs

9.1.1.7

OTHER 1 CVE

9.12.4.4

OTHER 26 CVEs

9.14.4.23

OTHER 22 CVEs

9.1.5.3

OTHER 1 CVE

9.8.4.34

OTHER 26 CVEs

9.12.4.38

OTHER 26 CVEs

9.8.2.33

OTHER 23 CVEs

9.20.1.5

OTHER 16 CVEs

9.14.3.18

OTHER 29 CVEs

9.14.3.15

OTHER 29 CVEs

9.8.1

SEMANTIC 21 CVEs

9.12.1.3

OTHER 25 CVEs

9.12.4.47

OTHER 24 CVEs

9.15.1.15

OTHER 29 CVEs

9.1.2.6

OTHER 1 CVE

9.8.2.26

OTHER 22 CVEs

9.12.4.48

OTHER 24 CVEs

9.0.1.2

OTHER 1 CVE

9.17.1.9

OTHER 32 CVEs

9.20.2

SEMANTIC 16 CVEs

9.12.4.41

OTHER 25 CVEs

9.8.3.29

OTHER 24 CVEs

9.8.4.8

OTHER 24 CVEs

9.14.4.15

OTHER 25 CVEs

9.8.3.26

OTHER 24 CVEs

9.14.1.10

OTHER 29 CVEs

9.0.2.6

OTHER 1 CVE

9.8.3.14

OTHER 24 CVEs

9.17.1.33

OTHER 18 CVEs

9.16.3.3

OTHER 29 CVEs

9.14.1

SEMANTIC 28 CVEs

9.12.3.9

OTHER 25 CVEs

9.0.3.1

OTHER 1 CVE

9.14.3

SEMANTIC 29 CVEs

9.15.1.17

OTHER 29 CVEs

9.8.3.18

OTHER 24 CVEs

9.1.4.3

OTHER 1 CVE

9.1.5.6

OTHER 1 CVE

9.18.4.5

OTHER 16 CVEs

9.16.4.14

OTHER 23 CVEs

9.8.4.45

OTHER 26 CVEs

9.12.3

SEMANTIC 25 CVEs

9.1.3.4

OTHER 1 CVE

9.19.1.28

OTHER 10 CVEs

9.14.2.13

OTHER 29 CVEs

9.3.1

SEMANTIC 1 CVE

9.8.3

SEMANTIC 23 CVEs

9.20.3

SEMANTIC 2 CVEs

9.8.4.20

OTHER 25 CVEs

9.18.3.53

OTHER 19 CVEs

9.17.1

SEMANTIC 34 CVEs

9.18.4.22

OTHER 10 CVEs

9.16.1.28

OTHER 30 CVEs

9.17.1.20

OTHER 29 CVEs

9.12.4

SEMANTIC 25 CVEs

9.12.4.67

OTHER 9 CVEs

9.14.4.22

OTHER 24 CVEs

9.12.4.29

OTHER 26 CVEs

9.8.4.10

OTHER 24 CVEs

9.12.2.9

OTHER 24 CVEs

9.16.4.61

OTHER 7 CVEs

9.14.4.7

OTHER 27 CVEs

9.14.3.11

OTHER 29 CVEs

9.8.2.8

OTHER 22 CVEs

9.16.1

SEMANTIC 30 CVEs

9.18.2

SEMANTIC 31 CVEs

9.8.3.8

OTHER 23 CVEs

9.16.4.70

OTHER 1 CVE

9.19.1.24

OTHER 18 CVEs

9.17.1.11

OTHER 30 CVEs

9.12.4.52

OTHER 24 CVEs

9.19.1

SEMANTIC 31 CVEs

9.19.1.5

OTHER 28 CVEs

9.15.1.16

OTHER 29 CVEs

9.8.2.45

OTHER 11 CVEs

9.17.1.15

OTHER 30 CVEs

9.8.4.17

OTHER 25 CVEs

9.16.4.27

OTHER 19 CVEs

9.12.1

SEMANTIC 24 CVEs

9.8.4

SEMANTIC 24 CVEs

9.17.1.10

OTHER 31 CVEs

9.14.4.6

OTHER 28 CVEs

9.16.3.14

OTHER 29 CVEs

9.16.4.48

OTHER 16 CVEs

9.4.2.6

OTHER 1 CVE

9.8.4.46

OTHER 24 CVEs

9.0.1.4

OTHER 1 CVE

9.8.4.15

OTHER 25 CVEs

9.18.3.46

OTHER 23 CVEs

9.8.4.32

OTHER 26 CVEs

9.14.3.13

OTHER 29 CVEs

9.14.1.6

OTHER 25 CVEs

9.19.1.18

OTHER 20 CVEs

9.16.2

SEMANTIC 30 CVEs

9.8.4.48

OTHER 24 CVEs

9.14.1.30

OTHER 29 CVEs

9.15.1

SEMANTIC 29 CVEs

9.8.4.22

OTHER 26 CVEs

9.19.1.31

OTHER 8 CVEs

9.17.1.13

OTHER 31 CVEs

9.12.4.55

OTHER 24 CVEs

9.19.1.22

OTHER 18 CVEs

9.1.5.7

OTHER 1 CVE

9.14.4.17

OTHER 25 CVEs

9.0.2.2

OTHER 1 CVE

9.16.2.3

OTHER 30 CVEs

9.18.4.29

OTHER 6 CVEs

9.12.4.7

OTHER 26 CVEs

9.15.1.10

OTHER 29 CVEs

9.16.4.67

OTHER 1 CVE

9.14.4.14

OTHER 25 CVEs

9.19.1.27

OTHER 17 CVEs

9.12.1.2

OTHER 24 CVEs

9.18.4

SEMANTIC 16 CVEs

9.16.3.19

OTHER 27 CVEs

9.14.3.1

OTHER 29 CVEs

9.8.1.7

OTHER 21 CVEs

9.16.4.42

OTHER 16 CVEs

9.18.3.55

OTHER 18 CVEs

9.16.2.7

OTHER 30 CVEs

9.12.4.26

OTHER 26 CVEs

9.1.2.5

OTHER 1 CVE

9.12.4.40

OTHER 25 CVEs

9.1.1.8

OTHER 1 CVE

9.8.1.5

OTHER 21 CVEs

9.8.4.43

OTHER 26 CVEs

9.14.2.8

OTHER 29 CVEs

9.8.2.35

OTHER 23 CVEs

9.16.2.11

OTHER 30 CVEs

9.18.4.24

OTHER 7 CVEs

9.14.2.15

OTHER 29 CVEs

9.16.4.62

OTHER 2 CVEs

9.14.1.15

OTHER 29 CVEs

9.17.1.30

OTHER 25 CVEs

9.14.4.24

OTHER 13 CVEs

9.8.4.12

OTHER 25 CVEs

9.19.1.12

OTHER 25 CVEs

9.8.4.41

OTHER 26 CVEs

9.18.1

SEMANTIC 33 CVEs

9.12.4.37

OTHER 26 CVEs

9.8.2.38

OTHER 23 CVEs

9.1.4.6

OTHER 1 CVE

9.8.4.39

OTHER 26 CVEs

9.0.1.1

OTHER 1 CVE

9.20.2.10

OTHER 10 CVEs

9.12.4.2

OTHER 26 CVEs

9.12.4.62

OTHER 14 CVEs

9.12.4.18

OTHER 26 CVEs

9.12.4.54

OTHER 24 CVEs

9.12.2.5

OTHER 24 CVEs

9.12.4.10

OTHER 26 CVEs

9.8.4.44

OTHER 26 CVEs

9.8.4.3

OTHER 24 CVEs

9.8.3.21

OTHER 24 CVEs

9.8.3.11

OTHER 23 CVEs

9.16.3.15

OTHER 27 CVEs

9.16.4.18

OTHER 22 CVEs

9.8.2.24

OTHER 22 CVEs

9.20.2.21

OTHER 7 CVEs

9.19.1.9

OTHER 27 CVEs

9.8.4.29

OTHER 26 CVEs

9.8.2.28

OTHER 23 CVEs

9.1.2

SEMANTIC 1 CVE

9.12.3.7

OTHER 25 CVEs

9.16.4.57

OTHER 9 CVEs

9.16.3

SEMANTIC 29 CVEs

9.0.3.10

OTHER 1 CVE

9.15.1.1

OTHER 29 CVEs

9.12.2.1

OTHER 24 CVEs

9.12.4.56

OTHER 22 CVEs

9.16.4.39

OTHER 16 CVEs

9.8.2

SEMANTIC 22 CVEs

9.8.4.33

OTHER 24 CVEs

9.0.3.3

OTHER 1 CVE

9.1.1.2

OTHER 1 CVE

9.16.4.9

OTHER 27 CVEs

9.12.3.2

OTHER 25 CVEs

unspecified

OTHER 28 CVEs

9.1.5.2

OTHER 1 CVE

9.8.4.25

OTHER 26 CVEs

9.14.4.13

OTHER 25 CVEs

9.20.2.22

OTHER 4 CVEs

9.17.1.39

OTHER 11 CVEs

9.12.4.30

OTHER 26 CVEs

9.12.3.12

OTHER 25 CVEs

9.14.4.12

OTHER 26 CVEs

9.8.2.17

OTHER 22 CVEs

9.20.1

SEMANTIC 16 CVEs

9.8.4.7

OTHER 24 CVEs

9.18.2.7

OTHER 30 CVEs

9.18.4.34

OTHER 1 CVE

9.18.2.5

OTHER 31 CVEs

9.18.3.56

OTHER 17 CVEs

9.5.3.1

OTHER 1 CVE

9.8.2.14

OTHER 22 CVEs

9.18.3.39

OTHER 24 CVEs

9.14.1.19

OTHER 29 CVEs

9.16.4.55

OTHER 13 CVEs

9.12.4.39

OTHER 26 CVEs

9.16.2.13

OTHER 30 CVEs

9.12.4.8

OTHER 25 CVEs

9.14.2.4

OTHER 29 CVEs

9.16.4.38

OTHER 17 CVEs

9.15.1.7

OTHER 29 CVEs

9.12.4.50

OTHER 24 CVEs

9.4

MAJOR_MINOR 1 CVE

9.16.4.19

OTHER 21 CVEs

9.12.2.4

OTHER 23 CVEs

9.16.4

SEMANTIC 28 CVEs

9.12.4.65

OTHER 14 CVEs

9.8.4.26

OTHER 26 CVEs

9.12.2

SEMANTIC 24 CVEs

9.14.3.9

OTHER 29 CVEs

9.8.4.40

OTHER 26 CVEs

9.8.2.20

OTHER 22 CVEs

9.1.2.3

OTHER 1 CVE

9.16.2.14

OTHER 30 CVEs

9.4.2.11

OTHER 1 CVE

9.18.4.40

OTHER 1 CVE

9.12.4.58

OTHER 19 CVEs

9.18.3

SEMANTIC 26 CVEs

9.0.2.12

OTHER 1 CVE

9.18.1.3

OTHER 31 CVEs

9.1.5.1

OTHER 1 CVE

9.14.2

SEMANTIC 29 CVEs

9.17.1.7

OTHER 32 CVEs

9.12.4.24

OTHER 26 CVEs

9.18.2.8

OTHER 29 CVEs

Recent CVEs

CVE-2021-1444

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see .

MEDIUM Nov 18, 2024

CVE-2024-20526

A vulnerability in the SSH server of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition for the SSH server of an affected device. This vulnerability is due to a logic error when an SSH session is established. An attacker could exploit this vulnerability by sending crafted SSH messages to an affected device. A successful exploit could allow the attacker to exhaust available SSH resources on the affected device so that new SSH connections to the device are denied, resulting in a DoS condition. Existing SSH connections to the device would continue to function normally. The device must be rebooted manually to recover. However, user traffic would not be impacted and could be managed using a remote application such as Cisco Adaptive Security Device Manager (ASDM).

MEDIUM Oct 23, 2024

CVE-2024-20494

A vulnerability in the TLS cryptography functionality of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper data validation during the TLS 1.3 handshake. An attacker could exploit this vulnerability by sending a crafted TLS 1.3 packet to an affected system through a TLS 1.3-enabled listening socket. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: This vulnerability can also impact the integrity of a device by causing VPN HostScan communication failures or file transfer failures when Cisco ASA Software is upgraded using Cisco Adaptive Security Device Manager (ASDM).

HIGH Oct 23, 2024

CVE-2024-20493

A vulnerability in the login authentication functionality of the Remote Access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to deny further VPN user authentications for several minutes, resulting in a temporary denial of service (DoS) condition. This vulnerability is due to ineffective handling of memory resources during the authentication process. An attacker could exploit this vulnerability by sending crafted packets, which could cause resource exhaustion of the authentication process. A successful exploit could allow the attacker to deny authentication for Remote Access SSL VPN users for several minutes, resulting in a temporary DoS condition.

MEDIUM Oct 23, 2024

CVE-2024-20485

A vulnerability in the VPN web server of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability is due to improper validation of a specific file when it is read from system flash memory. An attacker could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.

MEDIUM Oct 23, 2024

CVE-2024-20358

A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functionality that is available in Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability exists because the contents of a backup file are improperly sanitized at restore time. An attacker could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as root.

MEDIUM Apr 24, 2024

CVE-2024-20353

A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.

HIGH Apr 24, 2024

CVE-2023-20256

Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. These vulnerabilities are due to a logic error that could occur when the affected software constructs and applies per-user-override rules. An attacker could exploit these vulnerabilities by connecting to a network through an affected device that has a vulnerable configuration. A successful exploit could allow the attacker to bypass the interface ACL and access resources that would should be protected.

MEDIUM Nov 01, 2023

CVE-2023-20006

A vulnerability in the hardware-based SSL/TLS cryptography functionality of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Appliances could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to an implementation error within the cryptographic functions for SSL/TLS traffic processing when they are offloaded to the hardware. An attacker could exploit this vulnerability by sending a crafted stream of SSL/TLS traffic to an affected device. A successful exploit could allow the attacker to cause an unexpected error in the hardware-based cryptography engine, which could cause the device to reload.

HIGH Jun 28, 2023

CVE-2022-20713

A vulnerability in the VPN web client services component of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks against users of an affected device. This vulnerability is due to improper validation of input that is passed to the VPN web client services component before being returned to the browser that is in use. An attacker could exploit this vulnerability by persuading a user to visit a website that is designed to pass malicious requests to a device that is running Cisco ASA Software or Cisco FTD Software and has web services endpoints supporting VPN features enabled. A successful exploit could allow the attacker to reflect malicious input from the affected device to the browser that is in use and conduct browser-based attacks, including cross-site scripting attacks. The attacker could not directly impact the affected device.

MEDIUM Aug 10, 2022