Описание
Cisco FireSIGHT System Software 5.4.0 through 6.0.1 and ASA with FirePOWER Services 5.4.0 through 6.0.0.1 allow remote attackers to bypass malware protection via crafted fields in HTTP headers, aka Bug ID CSCux22726.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:asa_with_firepower_services:5.4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:asa_with_firepower_services:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:asa_with_firepower_services:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:5.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:5.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:5.4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:5.4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:5.4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:5.4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:5.4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:5.4.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:5.4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:5.4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:5.4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firesight_system_software:6.0.1:*:*:*:*:*:*:*
EPSS
Процентиль: 65%
0.00488
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
Cisco FireSIGHT System Software 5.4.0 through 6.0.1 and ASA with FirePOWER Services 5.4.0 through 6.0.0.1 allow remote attackers to bypass malware protection via crafted fields in HTTP headers, aka Bug ID CSCux22726.
EPSS
Процентиль: 65%
0.00488
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-20