Description
The Unicast Reverse Path Forwarding (uRPF) implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(1.50), 9.3(2.100), 9.3(3), and 9.4(1) mishandles cases where an IP address belongs to an internal interface but is also in the ASA routing table, which allows remote attackers to bypass uRPF validation via spoofed packets, aka Bug ID CSCuv60724.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-4344 | The Unicast Reverse Path Forwarding (uRPF) implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(1.50), 9.3(2.100), 9.3(3), and 9.4(1) mishandles cases where an IP address belongs to an internal interface but is also in the ASA routing table, which allows remote attackers to bypass uRPF validation via spoofed packets, aka Bug ID CSCuv60724. |
References
History
No history.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-08-06T06:11:12.892Z
Reserved: 2015-06-04T00:00:00.000Z
Link: CVE-2015-4321
No data.
Status : Modified
Published: 2015-08-20T10:59:09.950
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-4321
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD