Multiple vulnerabilities have been reported in the handling of the embryonic connection limits in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software could allow unauthenticated, remote attacker to cause incoming TCP SYN packets to be dropped incorrectly, local attacker with administrative privileges in one context to copy files to or from another context, including configuration files.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
The information provided herein is on "as is" basis, without warranty of any kind.