Guest

Preview Tool

Cisco Bug: CSCus08101 - ASA: evaluation of Poodle Bites in TLSv1

Last Modified

Aug 24, 2017

Products (1)

  • Cisco ASA 5500-X Series Firewalls

Known Affected Releases

7.2 8.0 8.1 8.2 8.3 8.4 8.5 8.6(1) 9.0 9.1 9.1(5) 9.1(5.19) 9.2 9.3

Description (partial)


Symptom:
Cisco ASA includes a version of TLS that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-8730

This vulnerability is hardware dependent.
ANY Cisco ASA Software releases running for Cisco ASAv and Cisco ASA1000v ARE NOT affected by this vulnerability.
ALL Cisco ASA Software releases running on Cisco ASA 5500 and 5500-X Series and Cisco ASA Service Module ARE affected by this issue.

The first fixed ASA software releases for this vulnerability are as follows
  8.2 Train:   8.2.5.55
  8.4 Train:   8.4.7.26
  9.0 Train:   9.0.4.29
  9.1 Train:   9.1.6
  9.2 Train:   9.2.3.3
  9.3 Train:   9.3.2.2


Conditions:
The Cisco ASA Software is affected by this vulnerability if a feature which use TLS is enabled. The exposure will be confined to that feature only.
Examples of feature using TLS are, HTTP Secure server for Management, Clientless and AnyConnect SSL VPN, TLS Proxy, Phone Proxy etc...

Related Community Discussions

<key>CSCus08101</key> - ASA evaluation of Poodle Bites in TLSv1
Will Cisco provide an update to the legacy ASA product line like the 5510, 5520, 5540?  Code seems to have stopped for these platforms.
Latest activity: Apr 08, 2015
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.