A vulnerability in the Cisco Adaptive Security Appliance (ASA) Software implementation of access control list (ACL) permit and deny filters for ICMP echo reply messages could allow an unauthenticated, remote attacker to bypass ACL configurations for an affected device.
ICMP traffic that should be denied may instead be allowed through an affected device.The vulnerability is due to the implementation of ACL-based filters for ICMP echo requests and the range of ICMP echo request subtypes.
An attacker could exploit this vulnerability by sending ICMP echo request traffic to an affected device.
A successful exploit could allow the attacker to bypass ACL configurations for the device, which could allow traffic that should be denied to instead be allowed through the device.Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160711-asa