ID

VAR-201610-0275


CVE

CVE-2016-6424


TITLE

Cisco Adaptive Security Appliance Software DHCP Denial of service in relay implementation (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-005137

DESCRIPTION

The DHCP Relay implementation in Cisco Adaptive Security Appliance (ASA) Software 8.4.7.29 and 9.1.7.4 allows remote attackers to cause a denial of service (interface wedge) via a crafted rate of DHCP packet transmission, aka Bug ID CSCuy66942. Cisco ASA Software is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCuy66942. Cisco ASA Software is vulnerable. The platform provides features such as highly secure access to data and network resources

Trust: 1.98

sources: NVD: CVE-2016-6424 // JVNDB: JVNDB-2016-005137 // BID: 93408 // VULHUB: VHN-95244

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4.7.29

Trust: 2.4

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1\(7\)4

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.7.4

Trust: 1.4

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:0

Trust: 0.3

sources: BID: 93408 // JVNDB: JVNDB-2016-005137 // CNNVD: CNNVD-201610-075 // NVD: CVE-2016-6424

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-6424
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-6424
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201610-075
value: MEDIUM

Trust: 0.6

VULHUB: VHN-95244
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-6424
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-95244
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-6424
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-95244 // JVNDB: JVNDB-2016-005137 // CNNVD: CNNVD-201610-075 // NVD: CVE-2016-6424

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-95244 // JVNDB: JVNDB-2016-005137 // NVD: CVE-2016-6424

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201610-075

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201610-075

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005137

PATCH

title:cisco-sa-20161005-asa-dhcpurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-asa-dhcp

Trust: 0.8

title:Cisco ASA DHCP Relay Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64503

Trust: 0.6

sources: JVNDB: JVNDB-2016-005137 // CNNVD: CNNVD-201610-075

EXTERNAL IDS

db:NVDid:CVE-2016-6424

Trust: 2.8

db:SECTRACKid:1036961

Trust: 1.7

db:BIDid:93408

Trust: 1.4

db:JVNDBid:JVNDB-2016-005137

Trust: 0.8

db:CNNVDid:CNNVD-201610-075

Trust: 0.7

db:VULHUBid:VHN-95244

Trust: 0.1

sources: VULHUB: VHN-95244 // BID: 93408 // JVNDB: JVNDB-2016-005137 // CNNVD: CNNVD-201610-075 // NVD: CVE-2016-6424

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161005-asa-dhcp

Trust: 2.0

url:http://www.securityfocus.com/bid/93408

Trust: 1.1

url:http://www.securitytracker.com/id/1036961

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6424

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6424

Trust: 0.8

url:http://securitytracker.com/id/1036961

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-95244 // BID: 93408 // JVNDB: JVNDB-2016-005137 // CNNVD: CNNVD-201610-075 // NVD: CVE-2016-6424

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 93408

SOURCES

db:VULHUBid:VHN-95244
db:BIDid:93408
db:JVNDBid:JVNDB-2016-005137
db:CNNVDid:CNNVD-201610-075
db:NVDid:CVE-2016-6424

LAST UPDATE DATE

2024-11-23T23:05:34.735000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-95244date:2018-10-30T00:00:00
db:BIDid:93408date:2016-10-10T04:02:00
db:JVNDBid:JVNDB-2016-005137date:2016-10-12T00:00:00
db:CNNVDid:CNNVD-201610-075date:2016-10-11T00:00:00
db:NVDid:CVE-2016-6424date:2024-11-21T02:56:06.230

SOURCES RELEASE DATE

db:VULHUBid:VHN-95244date:2016-10-06T00:00:00
db:BIDid:93408date:2016-10-05T00:00:00
db:JVNDBid:JVNDB-2016-005137date:2016-10-12T00:00:00
db:CNNVDid:CNNVD-201610-075date:2016-10-11T00:00:00
db:NVDid:CVE-2016-6424date:2016-10-06T10:59:10.163