CVE-2021-40118 (CNNVD-202110-1974)
中文标题:
Cisco Adaptive Security Appliances Software和Cisco Firepower Threat Defense 缓冲区错误漏洞
英文标题:
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Denial of Service Vulnerabilities
漏洞描述
中文描述:
Cisco Firepower Threat Defense(FTD)和Cisco Adaptive Security Appliances Software(ASA Software)都是美国思科(Cisco)公司的产品。Cisco Firepower Threat Defense是一套提供下一代防火墙服务的统一软件。Cisco Adaptive Security Appliances Software是一套防火墙和网络安全平台。该平台提供了对数据和网络资源的高度安全的访问等功能。 Cisco Firepower Threat Defense(FTD)和Cisco Adaptive Security Appliances Software(ASA Software)存在缓冲区错误漏洞,该漏洞源于解析HTTPS请求时不正确的输入验证造成的。攻击者可利用该漏洞触发拒绝服务(DoS)条件。
英文描述:
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Adaptive Security Appliance (ASA) Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_adaptive_security_appliance_(asa)_software:n_a:*:*:*:*:*:*:*
|
| cisco | adaptive_security_appliance | * | - | - |
cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*
|
| cisco | firepower_threat_defense | * | - | - |
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
|
| cisco | adaptive_security_appliance_software | * | - | - |
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 009.012\(004.024\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:009.012\(004.024\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 009.015\(001\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:009.015\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 009.015\(001.015\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:009.015\(001.015\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 009.015\(001.016\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:009.015\(001.016\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 009.016\(001\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:009.016\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 009.012\(004.024\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:009.012\(004.024\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 009.015\(001\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:009.015\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 009.015\(001.015\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:009.015\(001.015\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 009.015\(001.016\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:009.015\(001.016\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 009.016\(001\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:009.016\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 009.012\(004.024\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:009.012\(004.024\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 009.015\(001\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:009.015\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 009.015\(001.015\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:009.015\(001.015\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 009.015\(001.016\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:009.015\(001.016\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 009.016\(001\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:009.016\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 009.012\(004.024\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:009.012\(004.024\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 009.015\(001\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:009.015\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 009.015\(001.015\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:009.015\(001.015\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 009.015\(001.016\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:009.015\(001.016\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 009.016\(001\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:009.016\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 009.012\(004.024\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:009.012\(004.024\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 009.015\(001\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:009.015\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 009.015\(001.015\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:009.015\(001.015\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 009.015\(001.016\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:009.015\(001.016\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 009.016\(001\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:009.016\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 009.012\(004.024\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:009.012\(004.024\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 009.015\(001\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:009.015\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 009.015\(001.015\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:009.015\(001.015\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 009.015\(001.016\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:009.015\(001.016\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 009.016\(001\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:009.016\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 009.012\(004.024\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:009.012\(004.024\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 009.015\(001\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:009.015\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 009.015\(001.015\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:009.015\(001.015\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 009.015\(001.016\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:009.015\(001.016\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 009.016\(001\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:009.016\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 009.012\(004.024\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:009.012\(004.024\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 009.015\(001\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:009.015\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 009.015\(001.015\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:009.015\(001.015\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 009.015\(001.016\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:009.015\(001.016\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 009.016\(001\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:009.016\(001\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-40118 |
2025-11-11 15:21:05 | 2025-11-11 07:37:01 |
| NVD | nvd_CVE-2021-40118 |
2025-11-11 14:57:44 | 2025-11-11 07:45:19 |
| CNNVD | cnnvd_CNNVD-202110-1974 |
2025-11-11 15:10:45 | 2025-11-11 07:56:57 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 缓冲区错误
- cnnvd_id: 未提取 -> CNNVD-202110-1974
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 44
- data_sources: ['cve'] -> ['cve', 'nvd']