![]() A Trustpoint that is based on an RSA or ECDSA key pair that has been generated while running an affected release.Note: Devices running other releases of Cisco ASA Software or FTD Software may also be vulnerable if they are configured with at least one of the following: Adaptive Security Virtual Appliance (ASAv).Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services. ![]() 3000 Series Industrial Security Appliances (ISAs).This vulnerability affects the following Cisco products that are running Cisco ASA Software Releases 9.8 or 9.9 or FTD Software Releases 6.2.1, 6.2.2, or 6.2.3: This advisory is available at the following link: There are workarounds that address this vulnerability. Impersonate an affected target device or to decrypt traffic secured byĪn affected key that is sent to or from an affected target device.Ĭisco has released software updates that address this vulnerability. A successful exploit could allow the attacker to Of cryptographic keys on an affected device and looking for collisions AnĪttacker could exploit this vulnerability by generating a large number Insufficient entropy in the DRBG when generating cryptographic keys. (FTD) Software could allow an unauthenticated, remote attacker to cause aĬryptographic collision, enabling the attacker to discover the private Security Appliance (ASA) Software and Cisco Firepower Threat Defense Known as Pseudorandom Number Generator (PRNG), used in Cisco Adaptive ![]() A vulnerability in the Deterministic Random Bit Generator (DRBG), also
0 Comments
Leave a Reply. |