My guess is a researcher. 

We saw the same issue in the past with a Cisco microcode bug and people doing 
ping record route. When it went across a LC with a very specific set of 
software it would crash. 

If you crashed just upgrade your code, don't hide behind blocking an IP as 
people now know what to send/do. It won't be long. 

Jared Mauch

> On Jul 9, 2015, at 7:44 AM, Colin Johnston <col...@gt86car.org.uk> wrote:
> 
> Hi Jared,
> thanks for update
> 
> do you know provider/source ip of the source of the attack ?
> 
> Colin
> 
>> On 9 Jul 2015, at 12:27, Jared Mauch <ja...@puck.nether.net> wrote:
>> 
>> Really just people not patching their software after warnings more than six 
>> months ago:
>> 
>> July-08 UPDATE: Cisco PSIRT is aware of disruption to some Cisco customers 
>> with Cisco ASA devices affected by CVE-2014-3383, the Cisco ASA VPN Denial 
>> of Service Vulnerability that was disclosed in this Security Advisory. 
>> Traffic causing the disruption was isolated to a specific source IPv4 
>> address. Cisco has engaged the provider and owner of that device and 
>> determined that the traffic was sent with no malicious intent. Cisco 
>> strongly recommends that customers upgrade to a fixed Cisco ASA software 
>> release to remediate this issue. 
>> 
>> Cisco has released free software updates that address these vulnerabilities. 
>> Workarounds that mitigate some of these vulnerabilities are available.
>> 
>> Jared Mauch
>> 
>>> On Jul 8, 2015, at 1:15 PM, Michel Luczak <fr...@shrd.fr> wrote:
>>> 
>>> 
>>>> On 08 Jul 2015, at 18:58, Mark Mayfield 
>>>> <mark.mayfi...@cityofroseville.com> wrote:
>>>> 
>>>> Come in this morning to find one failover pair of ASA's had the primary 
>>>> crash and failover, then a couple hours later, the secondary crash and 
>>>> failover, back to the primary.
>>> 
>>> Not sure it’s related but I’ve read reports on FRNoG of ASAs crashing as 
>>> well, seems related to a late leap second related issue.
>>> 
>>> Regards, Michel

Reply via email to