Логотип exploitDog
bind:CVE-2019-1833
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1833

Количество 3

Количество 3

nvd логотип

CVE-2019-1833

больше 6 лет назад

A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-6ffw-22x4-4x3r

больше 3 лет назад

A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected.

CVSS3: 5.8
EPSS: Низкий
fstec логотип

BDU:2019-02063

больше 6 лет назад

Уязвимость в синтаксическом анализаторе протоколов Secure Sockets Layer (SSL) и Transport Layer Security (TLS) программного обеспечения администрирования сети Cisco Firepower Management Center, позволяющая нарушителю обойти существующие политики разграничения доступа

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1833

A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected.

CVSS3: 5.8
0%
Низкий
больше 6 лет назад
github логотип
GHSA-6ffw-22x4-4x3r

A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected.

CVSS3: 5.8
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-02063

Уязвимость в синтаксическом анализаторе протоколов Secure Sockets Layer (SSL) и Transport Layer Security (TLS) программного обеспечения администрирования сети Cisco Firepower Management Center, позволяющая нарушителю обойти существующие политики разграничения доступа

CVSS3: 5.8
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу