Lucene search

K
cveCiscoCVE-2020-3283
HistoryMay 06, 2020 - 5:15 p.m.

CVE-2020-3283

2020-05-0617:15:12
CWE-119
CWE-787
cisco
web.nvd.nist.gov
35
cisco
ftd
software
vulnerability
dos
attack
ssl
tls
cve-2020-3283

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

8.4

Confidence

High

EPSS

0.002

Percentile

61.1%

A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) handler of Cisco Firepower Threat Defense (FTD) Software when running on the Cisco Firepower 1000 Series platform could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to a communication error between internal functions. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause a buffer underrun, which leads to a crash. The crash causes the affected device to reload.

Affected configurations

Nvd
Node
ciscofirepower_threat_defenseRange6.4.06.4.0.9
AND
ciscofirepower_1010Match-
OR
ciscofirepower_1020Match-
OR
ciscofirepower_1030Match-
OR
ciscofirepower_1040Match-
Node
ciscoasa_5505_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5505_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5505Match-
Node
ciscoasa_5510_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5510_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5510Match-
Node
ciscoasa_5512-x_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5512-x_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5512-xMatch-
Node
ciscoasa_5515-x_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5515-x_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5515-xMatch-
Node
ciscoasa_5520_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5520_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5520Match-
Node
ciscoasa_5525-x_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5525-x_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5525-xMatch-
Node
ciscoasa_5540_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5540_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5540Match-
Node
ciscoasa_5545-x_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5545-x_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5545-xMatch-
Node
ciscoasa_5550_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5550_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5550Match-
Node
ciscoasa_5555-x_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5555-x_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5555-xMatch-
Node
ciscoasa_5580_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5580_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5580Match-
Node
ciscoasa_5585-x_firmwareMatch9.12\(2.12\)
OR
ciscoasa_5585-x_firmwareMatch9.13\(0.33\)
AND
ciscoasa_5585-xMatch-
VendorProductVersionCPE
ciscofirepower_threat_defense*cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
ciscofirepower_1010-cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*
ciscofirepower_1020-cpe:2.3:h:cisco:firepower_1020:-:*:*:*:*:*:*:*
ciscofirepower_1030-cpe:2.3:h:cisco:firepower_1030:-:*:*:*:*:*:*:*
ciscofirepower_1040-cpe:2.3:h:cisco:firepower_1040:-:*:*:*:*:*:*:*
ciscoasa_5505_firmware9.12(2.12)cpe:2.3:o:cisco:asa_5505_firmware:9.12\(2.12\):*:*:*:*:*:*:*
ciscoasa_5505_firmware9.13(0.33)cpe:2.3:o:cisco:asa_5505_firmware:9.13\(0.33\):*:*:*:*:*:*:*
ciscoasa_5505-cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*
ciscoasa_5510_firmware9.12(2.12)cpe:2.3:o:cisco:asa_5510_firmware:9.12\(2.12\):*:*:*:*:*:*:*
ciscoasa_5510_firmware9.13(0.33)cpe:2.3:o:cisco:asa_5510_firmware:9.13\(0.33\):*:*:*:*:*:*:*
Rows per page:
1-10 of 411

CNA Affected

[
  {
    "product": "Cisco Firepower Threat Defense Software",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

8.4

Confidence

High

EPSS

0.002

Percentile

61.1%