Lucene search

K
cveCiscoCVE-2020-3298
HistoryMay 06, 2020 - 5:15 p.m.

CVE-2020-3298

2020-05-0617:15:12
CWE-125
cisco
web.nvd.nist.gov
29
cisco
asa
ftd
vulnerability
ospf
denial of service
dos
nvd
cve-2020-3298

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.002

Percentile

52.6%

A vulnerability in the Open Shortest Path First (OSPF) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper memory protection mechanisms while processing certain OSPF packets. An attacker could exploit this vulnerability by sending a series of malformed OSPF packets in a short period of time to an affected device. A successful exploit could allow the attacker to cause a reload of the affected device, resulting in a DoS condition for client traffic that is traversing the device.

Affected configurations

Nvd
Node
ciscofirepower_threat_defenseRange6.2.06.2.3.16
OR
ciscofirepower_threat_defenseRange6.3.06.3.0.6
OR
ciscofirepower_threat_defenseRange6.4.06.4.0.9
OR
ciscofirepower_threat_defenseRange6.5.06.5.0.5
OR
ciscoadaptive_security_appliance_softwareRange9.6.09.6.4.40
OR
ciscoadaptive_security_appliance_softwareRange9.8.09.8.4.17
OR
ciscoadaptive_security_appliance_softwareRange9.9.09.9.2.66
OR
ciscoadaptive_security_appliance_softwareRange9.10.09.10.1.37
OR
ciscoadaptive_security_appliance_softwareRange9.12.09.12.3.7
OR
ciscoadaptive_security_appliance_softwareRange9.13.09.13.1.7
AND
ciscoasa_5506-xMatch-
OR
ciscoasa_5506h-xMatch-
OR
ciscoasa_5506w-xMatch-
OR
ciscoasa_5508-xMatch-
OR
ciscoasa_5516-xMatch-
OR
ciscoasa_5525-xMatch-
OR
ciscoasa_5545-xMatch-
OR
ciscoasa_5555-xMatch-
VendorProductVersionCPE
ciscofirepower_threat_defense*cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
ciscoadaptive_security_appliance_software*cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
ciscoasa_5506-x-cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*
ciscoasa_5506h-x-cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*
ciscoasa_5506w-x-cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*
ciscoasa_5508-x-cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*
ciscoasa_5516-x-cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*
ciscoasa_5525-x-cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*
ciscoasa_5545-x-cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*
ciscoasa_5555-x-cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Cisco Adaptive Security Appliance (ASA) Software",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.002

Percentile

52.6%