The Cavium cryptographic-module firmware on Cisco Adaptive Security Appliance (ASA) devices with software 9.3(3) and 9.4(1.1) does not verify the AES-GCM Integrity Check Value (ICV) octets, which makes it easier for man-in-the-middle attackers to spoof IPSec and IKEv2 traffic by modifying packet data, aka Bug ID CSCuu66218.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 02:31
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://tools.cisco.com/security/center/viewAlert.x?alertId=39366 - Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/75269 - | |
| References | () http://www.securitytracker.com/id/1032595 - | 
11 Aug 2023, 18:54
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3\(3\):*:*:*:*:*:*:*  | 
    cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\(3\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4\(1.1\):*:*:*:*:*:*:*  | 
Information
                Published : 2015-06-17 10:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-4550
Mitre link : CVE-2015-4550
CVE.ORG link : CVE-2015-4550
JSON object : View
Products Affected
                cisco
- adaptive_security_appliance_software
 
CWE
                
                    
                        
                        CWE-310
                        
            Cryptographic Issues
