| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.5 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in Cisco ASA 5500 up to 7.0(4). This impacts an unknown function of the component ARP Heartbeat Handler. The manipulation leads to denial of service. This vulnerability is documented as CVE-2005-3788. The attack can be initiated remotely. There is not any exploit available. It is recommended to apply restrictive firewalling.
Details
A vulnerability, which was classified as critical, has been found in Cisco ASA 5500 up to 7.0(4) (Firewall Software). This issue affects an unknown code of the component ARP Heartbeat Handler. The manipulation with an unknown input leads to a denial of service vulnerability. Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. Impacted is availability. The summary by CVE is:
Race condition in Cisco Adaptive Security Appliance (ASA) 7.0(0), 7.0(2), and 7.0(4), when running with an Active/Standby configuration and when the failover LAN interface fails, allows remote attackers to cause a denial of service (standby firewall failure) by sending spoofed ARP responses from an IP address of an active firewall, which prevents the standby firewall from becoming active, aka "failover denial of service."
The bug was discovered 11/13/2005. The weakness was released 11/15/2005 by Amin Tora with ePlus Security Team (Website). The advisory is shared at secunia.com. The identification of this vulnerability is CVE-2005-3788 since 11/24/2005. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Neither technical details nor an exploit are publicly available. MITRE ATT&CK project uses the attack technique T1499 for this issue.
The vulnerability was handled as a non-public zero-day exploit for at least 2 days. During that time the estimated underground price was around $5k-$25k.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at cisco.com.Addressing this vulnerability is possible by firewalling . The best possible mitigation is suggested to be applying a restrictive firewalling.
The vulnerability is also documented in the databases at X-Force (23160), SecurityFocus (BID 15407†), OSVDB (20843†), Secunia (SA17550†) and SecurityTracker (ID 1015205†). If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 6.5
VulDB Base Score: 7.5
VulDB Temp Score: 6.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: FirewallStatus: 🔍
0-Day Time: 🔍
Patch: cisco.com
Timeline
11/13/2005 🔍11/13/2005 🔍
11/14/2005 🔍
11/15/2005 🔍
11/15/2005 🔍
11/15/2005 🔍
11/18/2005 🔍
11/24/2005 🔍
11/24/2005 🔍
10/24/2012 🔍
07/05/2019 🔍
Sources
Vendor: cisco.comAdvisory: secunia.com⛔
Researcher: Amin Tora
Organization: ePlus Security Team
Status: Confirmed
CVE: CVE-2005-3788 (🔍)
GCVE (CVE): GCVE-0-2005-3788
GCVE (VulDB): GCVE-100-1901
X-Force: 23160 - Cisco Adaptive Security Appliance failover denial of service, Medium Risk
SecurityFocus: 15407 - Cisco Adaptive Security Applicance Failover Testing Denial of Service Weakness
Secunia: 17550 - Cisco ASA Failover Denial of Service Weakness, Not Critical
OSVDB: 20843 - Cisco ASA Spoofed Packet Failover DoS
SecurityTracker: 1015205
Vulnerability Center: 36817 - Cisco ASA Race Condition Vulnerability Allows Remote DoS via Spoofed ARP Responses, High
Entry
Created: 11/18/2005 10:38Updated: 07/05/2019 14:04
Changes: 11/18/2005 10:38 (79), 07/05/2019 14:04 (5)
Complete: 🔍
Cache ID: 216::103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.

No comments yet. Languages: en.
Please log in to comment.