Executive Risk Summary
"A vulnerability in the Remote Access SSL VPN functionality of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to exhaust device memory resulting in a denial of service (DoS) condition. This vulnerability is due to trusting user input without validation and can be exploited by sending crafted packets to the Remote Access SSL VPN server."
Operational Audit Arsenal
Manual Verification Required
This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.
Patch Impact Forecast
Temporary loss of Remote Access SSL VPN connectivity and potential temporary unresponsiveness of the management interface
Internal Work Notes
Technical Intelligence & Operational Utilities • Delivered Weekly