A vulnerability in the TCP packet processing of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory exhaustion condition. An attacker could exploit this vulnerability by sending a high rate of crafted TCP traffic through an affected device. A successful exploit could allow the attacker to exhaust device resources, resulting in a DoS condition for traffic transiting the affected device.
2020-10-21T19:15:17.420
2024-11-21T05:31:18.257
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:C
10.0
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | adaptive_security_appliance | < 9.12.4.3 | Yes |
Application | cisco | firepower_threat_defense | ≤ 6.2.2 | Yes |
Application | cisco | firepower_threat_defense | < 6.4.0.10 | Yes |
Application | cisco | firepower_threat_defense | < 6.5.0.5 | Yes |
Application | cisco | firepower_threat_defense | 6.6.0 | Yes |
Operating System | cisco | adaptive_security_appliance_software | < 9.13.1.13 | Yes |
Operating System | cisco | adaptive_security_appliance_software | < 9.14.1.30 | Yes |