Reported vulnerabilities in Cisco Adaptive Security Appliance
CERT-In said the software and Cisco Firepower Threat Defense (FTD) software could allow attackers with root-level privileges to execute arbitrary commands and code on the underlying operating system, causing the device to reload unexpectedly. may be compromised, resulting in a denial of service (DoS). This is the latest advice.

A 'command injection vulnerability' exists in the reported software due to the contents of the backup file being improperly cleaned up during restore.

"An attacker could exploit this vulnerability by restoring a created backup file on an affected device," the cyber agency said.

Another 'denial of service vulnerability' exists due to incomplete error checking when parsing HTTP headers.

Attackers could exploit this vulnerability by "sending a crafted HTTP request to a web server targeting the device" and successful exploitation could allow them to cause a "DoS condition upon device reload."

Third, a 'code execution vulnerability' exists due to improper validation of the file when it is read from the system flash memory.

According to the cyber agency, an attacker could exploit this vulnerability by copying "a crafted file to the disk0: file system of the affected device."

Furthermore, CERT-In advised people to apply appropriate updates released by Cisco.