CVE-2018-15454
moderate-risk
Published 2018-11-01
A vulnerability in the Session Initiation Protocol (SIP) inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload or trigger high CPU, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of SIP traffic. An attacker could exploit this vulnerability by sending SIP requests designed to specifically trigger this issue at a high rate across an affected device. Software updates that address this vulnerability are not yet available.
Do I need to act?
~
4.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.6/10
High
NETWORK
/ LOW complexity
Affected Products (2)
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/105768
Third Party Advisory
http://www.securitytracker.com/id/1042129
Third Party Advisory
http://www.securityfocus.com/bid/105768
Third Party Advisory
http://www.securitytracker.com/id/1042129
43
/ 100
moderate-risk
Severity
29/34 · Critical
Exploitability
7/34 · Low
Exposure
7/34 · Low