CVE-2019-12693
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
02/10/2019
Last modified:
16/08/2023
Description
A vulnerability in the Secure Copy (SCP) feature of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to the use of an incorrect data type for a length variable. An attacker could exploit this vulnerability by initiating the transfer of a large file to an affected device via SCP. To exploit this vulnerability, the attacker would need to have valid privilege level 15 credentials on the affected device. A successful exploit could allow the attacker to cause the length variable to roll over, which could cause the affected device to crash.
Impact
Base Score 3.x
4.90
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:* | 9.6.4.30 (excluding) | |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.7 (including) | 9.8.4 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.9 (including) | 9.9.2.50 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.10 (including) | 9.10.1.22 (excluding) |
| cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | 9.12 (including) | 9.12.2.1 (excluding) |
| cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



