Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-1703

Опубликовано: 03 мая 2019
Источник: nvd
CVSS3: 8.6
CVSS3: 8.6
CVSS2: 7.8
EPSS Низкий

Описание

A vulnerability in the internal packet-processing functionality of Cisco Firepower Threat Defense (FTD) Software for the Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error, which may prevent ingress buffers from being replenished under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to consume all input buffers, which are shared between all interfaces, leading to a queue wedge condition in all active interfaces. This situation would cause an affected device to stop processing any incoming traffic and result in a DoS condition until the device is reloaded manually.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
Версия от 6.2.1 (включая) до 6.2.3.12 (исключая)

Одно из

cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*

EPSS

Процентиль: 65%
0.00496
Низкий

8.6 High

CVSS3

8.6 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-400
CWE-770

Связанные уязвимости

github
больше 3 лет назад

A vulnerability in the internal packet-processing functionality of Cisco Firepower Threat Defense (FTD) Software for the Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error, which may prevent ingress buffers from being replenished under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to consume all input buffers, which are shared between all interfaces, leading to a queue wedge condition in all active interfaces. This situation would cause an affected device to stop processing any incoming traffic and result in a DoS condition until the device is reloaded manually.

CVSS3: 8.6
fstec
почти 7 лет назад

Уязвимость микропрограммного обеспечения межсетевых экранов Cisco Firepower Threat Defense, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю остановить обработку трафика и вызвать состояние отказа в обслуживании

EPSS

Процентиль: 65%
0.00496
Низкий

8.6 High

CVSS3

8.6 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-400
CWE-770