Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-08258

Опубликовано: 27 окт. 2023
Источник: fstec
CVSS3: 5.4
CVSS2: 4
EPSS Низкий

Описание

Уязвимость модуля Snort микропрограммного обеспечения межсетевых экранов Cisco Firepower Threat Defense (FTD) связана с неконтролируемым расходом ресурсов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании в результате перезагрузки системы обнаружения вторжений Snort

Вендор

Cisco Systems Inc.

Наименование ПО

Firepower Threat Defense

Версия ПО

7.0.0 (Firepower Threat Defense)
7.2.0 (Firepower Threat Defense)
7.2.0.1 (Firepower Threat Defense)
от 6.7.0 до 6.7.0.3 включительно (Firepower Threat Defense)
7.0.0.1 (Firepower Threat Defense)
7.0.1 (Firepower Threat Defense)
7.0.1.1 (Firepower Threat Defense)
7.0.2 (Firepower Threat Defense)
7.0.2.1 (Firepower Threat Defense)
7.0.3 (Firepower Threat Defense)
7.0.4 (Firepower Threat Defense)
7.0.5 (Firepower Threat Defense)

Тип ПО

ПО программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,4)

Возможные меры по устранению уязвимости

Компенсирующие меры:
1. Рекомендуется перейти на более раннюю версию Snort 2 ( в результате чего будут удалены клиентские политики);
2. Необходимо отключить обнаружение идентификаторов сервера TLS и политику SSL.
Более подробная информация об определении конфигурации политики SSL, версии Snort и изменении настроек описана в бюллетене:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snort3-8U4HHxH8

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 4%
0.00017
Низкий

5.4 Medium

CVSS3

4 Medium

CVSS2

Связанные уязвимости

CVSS3: 4
ubuntu
больше 2 лет назад

A vulnerability in the SSL/TLS certificate handling of Snort 3 Detection Engine integration with Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to restart. This vulnerability is due to a logic error that occurs when an SSL/TLS certificate that is under load is accessed when it is initiating an SSL connection. Under specific, time-based constraints, an attacker could exploit this vulnerability by sending a high rate of SSL/TLS connection requests to be inspected by the Snort 3 detection engine on an affected device. A successful exploit could allow the attacker to cause the Snort 3 detection engine to reload, resulting in either a bypass or a denial of service (DoS) condition, depending on device configuration. The Snort detection engine will restart automatically. No manual intervention is required.

CVSS3: 4
nvd
больше 2 лет назад

A vulnerability in the SSL/TLS certificate handling of Snort 3 Detection Engine integration with Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to restart. This vulnerability is due to a logic error that occurs when an SSL/TLS certificate that is under load is accessed when it is initiating an SSL connection. Under specific, time-based constraints, an attacker could exploit this vulnerability by sending a high rate of SSL/TLS connection requests to be inspected by the Snort 3 detection engine on an affected device. A successful exploit could allow the attacker to cause the Snort 3 detection engine to reload, resulting in either a bypass or a denial of service (DoS) condition, depending on device configuration. The Snort detection engine will restart automatically. No manual intervention is required.

CVSS3: 4
github
больше 2 лет назад

A vulnerability in the SSL/TLS certificate handling of Snort 3 Detection Engine integration with Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to restart. This vulnerability is due to a logic error that occurs when an SSL/TLS certificate that is under load is accessed when it is initiating an SSL connection. Under specific, time-based constraints, an attacker could exploit this vulnerability by sending a high rate of SSL/TLS connection requests to be inspected by the Snort 3 detection engine on an affected device. A successful exploit could allow the attacker to cause the Snort 3 detection engine to reload, resulting in either a bypass or a denial of service (DoS) condition, depending on device configuration. The Snort detection engine will restart automatically. No manual intervention is required.

EPSS

Процентиль: 4%
0.00017
Низкий

5.4 Medium

CVSS3

4 Medium

CVSS2