Логотип exploitDog
bind:CVE-2020-3285
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3285

Количество 3

Количество 3

nvd логотип

CVE-2020-3285

почти 6 лет назад

A vulnerability in the Transport Layer Security version 1.3 (TLS 1.3) policy with URL category functionality for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured TLS 1.3 policy to block traffic for a specific URL. The vulnerability is due to a logic error with Snort handling of the connection with the TLS 1.3 policy and URL category configuration. An attacker could exploit this vulnerability by sending crafted TLS 1.3 connections to an affected device. A successful exploit could allow the attacker to bypass the TLS 1.3 policy and access URLs that are outside the affected device and normally would be dropped.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-4fxx-mff3-3wwr

больше 3 лет назад

A vulnerability in the Transport Layer Security version 1.3 (TLS 1.3) policy with URL category functionality for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured TLS 1.3 policy to block traffic for a specific URL. The vulnerability is due to a logic error with Snort handling of the connection with the TLS 1.3 policy and URL category configuration. An attacker could exploit this vulnerability by sending crafted TLS 1.3 connections to an affected device. A successful exploit could allow the attacker to bypass the TLS 1.3 policy and access URLs that are outside the affected device and normally would be dropped.

EPSS: Низкий
fstec логотип

BDU:2020-02151

почти 6 лет назад

Уязвимость библиотеки реализации протокола Transport Layer Security микропрограммного обеспечения межсетевых экранов Cisco Firepower Threat Defense, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3285

A vulnerability in the Transport Layer Security version 1.3 (TLS 1.3) policy with URL category functionality for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured TLS 1.3 policy to block traffic for a specific URL. The vulnerability is due to a logic error with Snort handling of the connection with the TLS 1.3 policy and URL category configuration. An attacker could exploit this vulnerability by sending crafted TLS 1.3 connections to an affected device. A successful exploit could allow the attacker to bypass the TLS 1.3 policy and access URLs that are outside the affected device and normally would be dropped.

CVSS3: 5.8
0%
Низкий
почти 6 лет назад
github логотип
GHSA-4fxx-mff3-3wwr

A vulnerability in the Transport Layer Security version 1.3 (TLS 1.3) policy with URL category functionality for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured TLS 1.3 policy to block traffic for a specific URL. The vulnerability is due to a logic error with Snort handling of the connection with the TLS 1.3 policy and URL category configuration. An attacker could exploit this vulnerability by sending crafted TLS 1.3 connections to an affected device. A successful exploit could allow the attacker to bypass the TLS 1.3 policy and access URLs that are outside the affected device and normally would be dropped.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02151

Уязвимость библиотеки реализации протокола Transport Layer Security микропрограммного обеспечения межсетевых экранов Cisco Firepower Threat Defense, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.8
0%
Низкий
почти 6 лет назад

Уязвимостей на страницу