Drag

Jump to

Stay tuned for
more insights

A Cisco ASA appliance was found to be affected by a remote code execution vulnerability. A buffer overflow can be caused by fragmented UDP IKE packets, potentially leading to execution of arbitrary code.

More information on these vulnerabilities can be found at the following URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike

Devices should be upgraded to a patched version of IOS. To find an appropriate patch level for the device consult this table:

VersionPatch to
7.21Affected; migrate to 9.1(6.11) or later
8.01Affected; migrate to 9.1(6.11) or later
8.11Affected; migrate to 9.1(6.11) or later
8.218.2(5.59)2
8.31Affected; migrate to 9.1(6.11) or later
8.48.4(7.30) or later
8.51Not affected
8.61Affected; migrate to 9.1(6.11) or later
8.78.7(1.18) or later
9.09.0(4.38) or later
9.19.1(6.11) or later
9.29.2(4.5) or later
9.39.3(3.7) or later
9.49.4(2.4) or later
9.59.5(2.2) or later

More information can be found at the following URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike