Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2018-15397 | First vendor Publication | 2018-10-05 |
Vendor | Cve | Last vendor Modification | 2023-08-15 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 6.8 | ||
Base Score | 6.8 | Environmental Score | 6.8 |
impact SubScore | 4 | Temporal Score | 6.8 |
Exploitabality Sub Score | 2.2 | ||
Attack Vector | Network | Attack Complexity | High |
Privileges Required | None | User Interaction | None |
Scope | Changed | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.1 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the implementation of Traffic Flow Confidentiality (TFC) over IPsec functionality in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error that may occur if the affected software renegotiates the encryption key for an IPsec tunnel when certain TFC traffic is in flight. An attacker could exploit this vulnerability by sending a malicious stream of TFC traffic through an established IPsec tunnel on an affected device. A successful exploit could allow the attacker to cause a daemon process on the affected device to crash, which could cause the device to crash and result in a DoS condition. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15397 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Os | 4 |
Sources (Detail)
Source | Url |
---|---|
CISCO | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
SECTRACK | http://www.securitytracker.com/id/1041786 |
Alert History
Date | Informations |
---|---|
2023-08-15 21:28:37 |
|
2021-05-04 13:09:42 |
|
2021-04-22 02:23:23 |
|
2020-09-02 17:23:03 |
|
2020-05-23 01:08:04 |
|
2019-10-10 05:20:25 |
|
2019-01-10 21:18:56 |
|
2018-10-07 17:19:24 |
|
2018-10-05 21:19:42 |
|