Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2018-0101

CWE-4158 documents7 sources
10
CVSS
CRITICAL
EPSS92.8%(100th)
Public Exploit
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0

Affected Packages3 packages

CVEListV5cisco_adaptive_security_applianceCisco Adaptive Security Appliance
A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the

🔴Vulnerability Details

3
GHSA
GHSA-gxj8-6mjh-32m2: A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthentic2022-05-13
CVEList
CVE-2018-0101: A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthentic2018-01-29
VulnCheck
Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) Double Free2018

💥Exploits & PoCs

1
Exploit-DB
Cisco ASA - Crash (PoC)2018-02-07

📋Vendor Advisories

1
Cisco
Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability2018-01-29

🕵️Threat Intelligence

1
Tenable
Identifying Systems Affected by Cisco ASA Critical Vulnerability (CVE-2018-0101)2018-02-06
CVE-2018-0101 (CRITICAL CVSS 10) | A vulnerability in the Secure Socke | cvebase.io