I’m sure they did.  It could also have been any number of other things.  I’m 
just guessing.  It could have been someone trying to scan their enterprise too 
and went a bit rogue.

Not everyone reads NANOG believe it or not :)

Either way, if you haven’t upgraded for a 9 month old security advisory, shame 
on you.  I don’t care what your change management process looks like, it’s 
bordering on network malpractice IMHO.

- Jared

> On Jul 9, 2015, at 10:09 AM, Colin Johnston <col...@gt86car.org.uk> wrote:
> 
> you would think a researcher would stop once he realised effect being caused ?
> 
> Colin
> 
>> On 9 Jul 2015, at 14:08, Jared Mauch <ja...@puck.nether.net> wrote:
>> 
>> My guess is a researcher. 
>> 
>> We saw the same issue in the past with a Cisco microcode bug and people 
>> doing ping record route. When it went across a LC with a very specific set 
>> of software it would crash. 
>> 
>> If you crashed just upgrade your code, don't hide behind blocking an IP as 
>> people now know what to send/do. It won't be long. 
>> 
>> Jared Mauch
>> 
>>> On Jul 9, 2015, at 7:44 AM, Colin Johnston <col...@gt86car.org.uk> wrote:
>>> 
>>> Hi Jared,
>>> thanks for update
>>> 
>>> do you know provider/source ip of the source of the attack ?
>>> 
>>> Colin
>>> 
>>>> On 9 Jul 2015, at 12:27, Jared Mauch <ja...@puck.nether.net> wrote:
>>>> 
>>>> Really just people not patching their software after warnings more than 
>>>> six months ago:
>>>> 
>>>> July-08 UPDATE: Cisco PSIRT is aware of disruption to some Cisco customers 
>>>> with Cisco ASA devices affected by CVE-2014-3383, the Cisco ASA VPN Denial 
>>>> of Service Vulnerability that was disclosed in this Security Advisory. 
>>>> Traffic causing the disruption was isolated to a specific source IPv4 
>>>> address. Cisco has engaged the provider and owner of that device and 
>>>> determined that the traffic was sent with no malicious intent. Cisco 
>>>> strongly recommends that customers upgrade to a fixed Cisco ASA software 
>>>> release to remediate this issue. 
>>>> 
>>>> Cisco has released free software updates that address these 
>>>> vulnerabilities. Workarounds that mitigate some of these vulnerabilities 
>>>> are available.
>>>> 
>>>> Jared Mauch
>>>> 
>>>>> On Jul 8, 2015, at 1:15 PM, Michel Luczak <fr...@shrd.fr> wrote:
>>>>> 
>>>>> 
>>>>>> On 08 Jul 2015, at 18:58, Mark Mayfield 
>>>>>> <mark.mayfi...@cityofroseville.com> wrote:
>>>>>> 
>>>>>> Come in this morning to find one failover pair of ASA's had the primary 
>>>>>> crash and failover, then a couple hours later, the secondary crash and 
>>>>>> failover, back to the primary.
>>>>> 
>>>>> Not sure it’s related but I’ve read reports on FRNoG of ASAs crashing as 
>>>>> well, seems related to a late leap second related issue.
>>>>> 
>>>>> Regards, Michel

Reply via email to