Dear Teneo Customer,
If you have ASA's you will have heard the recent news that a vulnerability in the Internet Key Exchange (IKE) version 1 (v1) and IKE version 2 (v2) code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.
The vulnerability is due to a buffer overflow in the affected code area. An attacker could exploit this vulnerability by sending crafted UDP packets to the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system.
The Solution
Palo Alto Networks have released an emergency content update to add coverage for the recent Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability, CVE-2016-1287. Customers are advised to upgrade all devices to the latest version of Content Apps and Threats and review policies to ensure desired actions are configured on all security policies.
Modified Decoders (1)
Name |
ike |
New Vulnerability Signatures (2)
Severity |
ID |
Attack Name |
CVE ID |
Vendor ID |
Default Action |
Minimum PAN-OS Version |
critical |
38894 |
Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability |
CVE-2016-1287 |
alert |
5.0.0 |
|
critical |
38895 |
Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability |
CVE-2016-1287 |
alert |
5.0.0 |
What if I need help?
If you have any questions regarding this notification please don’t hesitate to reach out to us, or visit our support portal.
You can contact us on our 24 x 7 support number or mail us support@teneo.net
EMEA: +44 (0)845 299 0623
US: +1 877 836 3610
APAC: +61 1800 765 389
Thanks
Teneo Support
Comments
0 comments
Article is closed for comments.