Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-20127

Опубликовано: 14 авг. 2025
Источник: nvd
CVSS3: 7.7
EPSS Низкий

Описание

A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.

This vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition. Note: These incoming TLS 1.3 connections include both data traffic and user-manage

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:cisco:firepower_threat_defense:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:7.4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:7.4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:7.6.0:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:cisco:secure_firewall_3105:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_3110:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_3120:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_3130:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_3140:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_4215:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_4225:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_4245:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

Одно из

cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1.5:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.10:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.21:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.22:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3.4:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.3.7:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.22.1.1:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:cisco:secure_firewall_3105:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_3110:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_3120:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_3130:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_3140:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_4215:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_4225:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_firewall_4245:-:*:*:*:*:*:*:*

EPSS

Процентиль: 40%
0.00185
Низкий

7.7 High

CVSS3

Дефекты

CWE-404

Связанные уязвимости

CVSS3: 7.7
github
6 месяцев назад

A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests. This vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition. Note: These incoming TLS 1.3 connections include both data traffic and user-manage...

CVSS3: 7.7
fstec
6 месяцев назад

Уязвимость функции обработки TLS микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Cisco Firepower Threat Defense (FTD) серий Firepower 3100 Series и Firepower 4200 Series, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 40%
0.00185
Низкий

7.7 High

CVSS3

Дефекты

CWE-404