Cisco Bug: CSCus08101 - ASA: evaluation of Poodle Bites in TLSv1
May 18, 2018
- Cisco ASA 5500-X Series Firewalls
Known Affected Releases
7.2 8.0 8.1 8.2 8.3 8.4 8.5 8.6(1) 9.0 9.1 9.1(5) 9.1(5.19) 9.2 9.3
Symptom: Cisco ASA includes a version of TLS that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2014-8730 This vulnerability is hardware dependent. ANY Cisco ASA Software releases running for Cisco ASAv and Cisco ASA1000v ARE NOT affected by this vulnerability. ALL Cisco ASA Software releases running on Cisco ASA 5500 and 5500-X Series and Cisco ASA Service Module ARE affected by this issue. The first fixed ASA software releases for this vulnerability are as follows 8.2 Train: 184.108.40.206 8.4 Train: 220.127.116.11 9.0 Train: 18.104.22.168 9.1 Train: 9.1.6 9.2 Train: 22.214.171.124 9.3 Train: 126.96.36.199 Conditions: The Cisco ASA Software is affected by this vulnerability if a feature which use TLS is enabled. The exposure will be confined to that feature only. Examples of feature using TLS are, HTTP Secure server for Management, Clientless and AnyConnect SSL VPN, TLS Proxy, Phone Proxy etc...
Related Community Discussions
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases