Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-20730


A vulnerability in the Security Intelligence feed feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the Security Intelligence DNS feed. This vulnerability is due to incorrect feed update processing. An attacker could exploit this vulnerability by sending traffic through an affected device that should be blocked by the affected device. A successful exploit could allow the attacker to bypass device controls and successfully send traffic to devices that are expected to be protected by the affected device.


Published

2022-05-03T04:15:09.120

Last Modified

2024-11-21T06:43:26.033

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-241
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco firepower_threat_defense < 6.4.0.15 Yes
Application cisco firepower_threat_defense < 6.6.5.2 Yes
Application cisco firepower_threat_defense < 7.0.2 Yes

References