Hi Jared,
thanks for update

do you know provider/source ip of the source of the attack ?

Colin

> On 9 Jul 2015, at 12:27, Jared Mauch <ja...@puck.nether.net> wrote:
> 
> Really just people not patching their software after warnings more than six 
> months ago:
> 
> July-08 UPDATE: Cisco PSIRT is aware of disruption to some Cisco customers 
> with Cisco ASA devices affected by CVE-2014-3383, the Cisco ASA VPN Denial of 
> Service Vulnerability that was disclosed in this Security Advisory. Traffic 
> causing the disruption was isolated to a specific source IPv4 address. Cisco 
> has engaged the provider and owner of that device and determined that the 
> traffic was sent with no malicious intent. Cisco strongly recommends that 
> customers upgrade to a fixed Cisco ASA software release to remediate this 
> issue. 
> 
> Cisco has released free software updates that address these vulnerabilities. 
> Workarounds that mitigate some of these vulnerabilities are available.
> 
> Jared Mauch
> 
>> On Jul 8, 2015, at 1:15 PM, Michel Luczak <fr...@shrd.fr> wrote:
>> 
>> 
>>> On 08 Jul 2015, at 18:58, Mark Mayfield <mark.mayfi...@cityofroseville.com> 
>>> wrote:
>>> 
>>> Come in this morning to find one failover pair of ASA's had the primary 
>>> crash and failover, then a couple hours later, the secondary crash and 
>>> failover, back to the primary.
>> 
>> Not sure it’s related but I’ve read reports on FRNoG of ASAs crashing as 
>> well, seems related to a late leap second related issue.
>> 
>> Regards, Michel

Reply via email to