A vulnerability in the SSL/TLS inspection of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series firewalls could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation for certain fields of specific SSL/TLS messages. An attacker could exploit this vulnerability by sending a malformed SSL/TLS message through an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. No manual intervention is needed to recover the device after it has reloaded.
2020-10-21T19:15:17.887
2024-11-21T05:31:19.267
Modified
CVSSv3.1: 8.6 (HIGH)
AV:N/AC:M/Au:N/C:N/I:N/A:C
8.6
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | firepower_threat_defense | 6.3.0 | Yes |
Application | cisco | firepower_threat_defense | 6.4.0 | Yes |
Application | cisco | firepower_threat_defense | 6.5.0 | Yes |
Hardware | cisco | firepower_2110 | - | No |
Hardware | cisco | firepower_2120 | - | No |
Hardware | cisco | firepower_2130 | - | No |
Hardware | cisco | firepower_2140 | - | No |