Cisco has released a security advisory fixing a vulnerability in Cisco security appliances, virtual appliances and services modules:
Due to a buffer overflow in the affected system, an unauthenticated remote attacker could send crafted UDP packets to an affected system to exploit the vulnerability.
A successful attack could cause a reload of the affected system, arbitrary code execution and full control of the system.
Patches for affected systems are now available. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk. For detailed information of the available patches, please refer to the section "Fixed Software" of corresponding security advisory at vendor's website.
Users should contact their product support vendors for the fixes and assistance.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike
https://www.hkcert.org/my_url/en/alert/16021119
https://www.us-cert.gov/ncas/current-activity/2016/02/10/Cisco-Releases-Security-Update
http://www.kb.cert.org/vuls/id/327976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1287