Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-10812

Опубликовано: 23 окт. 2024
Источник: fstec
CVSS3: 8.6
CVSS2: 7.8
EPSS Низкий

Описание

Уязвимость функции обработки TLS микропрограммного обеспечения межсетевых экранов Cisco Firepower Threat Defense (FTD) связана с разыменованием указателя NULL. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании

Вендор

Cisco Systems Inc.

Наименование ПО

Firepower Threat Defense

Версия ПО

6.2.3.16 (Firepower Threat Defense)
7.0.0 (Firepower Threat Defense)
7.2.0.1 (Firepower Threat Defense)
6.6.0.1 (Firepower Threat Defense)
6.6.5.1 (Firepower Threat Defense)
6.6.5.2 (Firepower Threat Defense)
7.0.0.1 (Firepower Threat Defense)
7.0.1 (Firepower Threat Defense)
7.0.1.1 (Firepower Threat Defense)
7.0.2 (Firepower Threat Defense)
7.0.2.1 (Firepower Threat Defense)
7.0.3 (Firepower Threat Defense)
7.0.4 (Firepower Threat Defense)
7.1.0.1 (Firepower Threat Defense)
7.0.5 (Firepower Threat Defense)
7.1.0.3 (Firepower Threat Defense)
7.3.1.1 (Firepower Threat Defense)
6.2.3.3 (Firepower Threat Defense)
6.2.3.4 (Firepower Threat Defense)
6.2.3.5 (Firepower Threat Defense)
6.2.3.6 (Firepower Threat Defense)
6.2.3.7 (Firepower Threat Defense)
6.2.3.8 (Firepower Threat Defense)
6.2.3.9 (Firepower Threat Defense)
6.2.3.10 (Firepower Threat Defense)
6.2.3.11 (Firepower Threat Defense)
6.2.3.12 (Firepower Threat Defense)
6.2.3.13 (Firepower Threat Defense)
6.2.3.14 (Firepower Threat Defense)
6.2.3.15 (Firepower Threat Defense)
6.2.3.17 (Firepower Threat Defense)
6.2.3.18 (Firepower Threat Defense)
6.4.0.1 (Firepower Threat Defense)
6.4.0.2 (Firepower Threat Defense)
6.4.0.3 (Firepower Threat Defense)
6.4.0.4 (Firepower Threat Defense)
6.4.0.5 (Firepower Threat Defense)
6.4.0.6 (Firepower Threat Defense)
6.4.0.7 (Firepower Threat Defense)
6.4.0.8 (Firepower Threat Defense)
6.4.0.9 (Firepower Threat Defense)
6.4.0.10 (Firepower Threat Defense)
6.4.0.11 (Firepower Threat Defense)
6.4.0.12 (Firepower Threat Defense)
6.4.0.13 (Firepower Threat Defense)
6.4.0.14 (Firepower Threat Defense)
6.4.0.15 (Firepower Threat Defense)
6.4.0.16 (Firepower Threat Defense)
6.6.7.1 (Firepower Threat Defense)
6.7.0.1 (Firepower Threat Defense)
6.7.0.2 (Firepower Threat Defense)
6.7.0.3 (Firepower Threat Defense)
6.2.3.1 (Firepower Threat Defense)
6.2.3.2 (Firepower Threat Defense)
7.0.6 (Firepower Threat Defense)
7.2.4.1 (Firepower Threat Defense)
6.4.0.17 (Firepower Threat Defense)
7.0.6.1 (Firepower Threat Defense)
7.2.5.1 (Firepower Threat Defense)
7.3.1.2 (Firepower Threat Defense)
6.6.7.2 (Firepower Threat Defense)
7.2.5.2 (Firepower Threat Defense)

Тип ПО

ПО программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,6)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-QXYE5Ufy

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 79%
0.01248
Низкий

8.6 High

CVSS3

7.8 High

CVSS2

Связанные уязвимости

CVSS3: 8.6
nvd
больше 1 года назад

A vulnerability in the TLS processing feature of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an issue that occurs when TLS traffic is processed. An attacker could exploit this vulnerability by sending certain TLS traffic over IPv4 through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition and impacting traffic to and through the affected device.

CVSS3: 8.6
github
больше 1 года назад

A vulnerability in the TLS processing feature of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an issue that occurs when TLS traffic is processed. An attacker could exploit this vulnerability by sending certain TLS traffic over IPv4 through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition and impacting traffic to and through the affected device.

EPSS

Процентиль: 79%
0.01248
Низкий

8.6 High

CVSS3

7.8 High

CVSS2