Rapid7 Vulnerability & Exploit Database

Cisco ASA: CVE-2019-15992: Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Code Execution Vulnerability (cisco-sa-20191112-asa-ftd-lua-rce)

Back to Search

Cisco ASA: CVE-2019-15992: Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Code Execution Vulnerability (cisco-sa-20191112-asa-ftd-lua-rce)

Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
01/02/2020
Created
01/02/2020
Added
01/02/2020
Modified
10/05/2020

Description

A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device.

Solution(s)

  • cisco-asa-upgrade-96_4_0_45
  • cisco-asa-upgrade-98_4_0_19
  • cisco-asa-upgrade-99_10_1_103
  • cisco-asa-upgrade-99_12_3_10
  • cisco-asa-upgrade-99_13_2_21
  • cisco-asa-upgrade-99_3_0_61
  • cisco-asa-upgrade-9_10_1_32
  • cisco-asa-upgrade-9_12_2_14
  • cisco-asa-upgrade-9_13_1_3
  • cisco-asa-upgrade-9_6_4_36
  • cisco-asa-upgrade-9_8_4_13
  • cisco-asa-upgrade-9_9_2_61

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;