Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w2qp-8fj2-5g53

Опубликовано: 04 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

A vulnerability in the local malware analysis process of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to insufficient error handling in the local malware analysis process of an affected device. An attacker could exploit this vulnerability by sending a crafted file through the device. A successful exploit could allow the attacker to cause the local malware analysis process to crash, which could result in a DoS condition. Notes: Manual intervention may be required to recover from this situation. Malware cloud lookup and dynamic analysis will not be impacted.

A vulnerability in the local malware analysis process of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to insufficient error handling in the local malware analysis process of an affected device. An attacker could exploit this vulnerability by sending a crafted file through the device. A successful exploit could allow the attacker to cause the local malware analysis process to crash, which could result in a DoS condition. Notes: Manual intervention may be required to recover from this situation. Malware cloud lookup and dynamic analysis will not be impacted.

EPSS

Процентиль: 69%
0.00585
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-400
CWE-664
CWE-755

Связанные уязвимости

CVSS3: 5.3
nvd
почти 4 года назад

A vulnerability in the local malware analysis process of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to insufficient error handling in the local malware analysis process of an affected device. An attacker could exploit this vulnerability by sending a crafted file through the device. A successful exploit could allow the attacker to cause the local malware analysis process to crash, which could result in a DoS condition. Notes: Manual intervention may be required to recover from this situation. Malware cloud lookup and dynamic analysis will not be impacted.

CVSS3: 5.3
fstec
почти 4 года назад

Уязвимость процесса анализа вредоносных программ микропрограммного обеспечения межсетевых экранов Cisco Firepower Threat Defense, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 69%
0.00585
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-400
CWE-664
CWE-755