CVE-2021-1501

8.6 HIGH

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to cause a denial of service by sending crafted SIP traffic through affected Cisco ASA and FTD devices. The vulnerability triggers a crash during SIP inspection hash lookups, forcing device reloads. Organizations using Cisco ASA Software or Firepower Threat Defense Software with SIP inspection enabled are affected.

💻 Affected Systems

Products:
  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software
Versions: Multiple versions prior to fixed releases (see Cisco advisory for specific affected versions)
Operating Systems: Cisco ASA OS, Cisco FTD OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when SIP inspection is enabled. Devices without SIP inspection configured are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption with repeated crashes and reloads, potentially causing extended network downtime and service unavailability.

🟠

Likely Case

Intermittent service disruptions as devices crash and reload, affecting SIP-based communications and potentially other traffic passing through the device.

🟢

If Mitigated

Minimal impact if SIP inspection is disabled or devices are patched, with normal operations continuing uninterrupted.

🌐 Internet-Facing: HIGH - Attackers can exploit this remotely without authentication by sending crafted SIP traffic to internet-facing interfaces.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but requires network access to send SIP traffic to affected devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted SIP packets, which is relatively straightforward for attackers with network access to affected devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple fixed versions available (see Cisco advisory for specific fixed releases)

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-sipdos-GGwmMerC

Restart Required: Yes

Instructions:

1. Review Cisco advisory for specific fixed versions for your device model. 2. Download appropriate firmware from Cisco. 3. Backup current configuration. 4. Apply firmware update following Cisco upgrade procedures. 5. Reboot device to complete installation.

🔧 Temporary Workarounds

Disable SIP Inspection

all

Temporarily disable SIP inspection to prevent exploitation while patching

policy-map global_policy
class inspection_default
no inspect sip

🧯 If You Can't Patch

  • Implement network segmentation to restrict SIP traffic to trusted sources only
  • Deploy intrusion prevention systems (IPS) to detect and block malicious SIP traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check if SIP inspection is enabled and compare device version against affected versions in Cisco advisory

Check Version:

show version | include Version

Verify Fix Applied:

Verify device is running a fixed version from Cisco advisory and confirm SIP inspection functionality

📡 Detection & Monitoring

Log Indicators:

  • Device crash and reload events
  • SIP inspection engine errors
  • High volume of malformed SIP packets

Network Indicators:

  • Unusual SIP traffic patterns
  • Crafted SIP packets with abnormal headers
  • Traffic causing hash collision patterns

SIEM Query:

source="asa" OR source="ftd" AND (event_type="crash" OR event_type="reload" OR message="SIP" AND message="inspect")

🔗 References

📤 Share & Export