CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
EPSS
Percentile
43.8%
A vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | adaptive_security_appliance_software | 9.14.1 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.14.1.6 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.6:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.14.1.10 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.10:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.14.1.15 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.15:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.14.1.19 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.19:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.14.1.30 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.14.2 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.14.2.4 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.4:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.14.2.8 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.8:*:*:*:*:*:*:* |
cisco | adaptive_security_appliance_software | 9.14.2.13 | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.13:*:*:*:*:*:*:* |
[
{
"vendor": "Cisco",
"product": "Cisco Adaptive Security Appliance (ASA) Software",
"versions": [
{
"version": "9.14.1",
"status": "affected"
},
{
"version": "9.14.1.10",
"status": "affected"
},
{
"version": "9.14.1.6",
"status": "affected"
},
{
"version": "9.14.1.15",
"status": "affected"
},
{
"version": "9.14.1.19",
"status": "affected"
},
{
"version": "9.14.1.30",
"status": "affected"
},
{
"version": "9.14.2",
"status": "affected"
},
{
"version": "9.14.2.4",
"status": "affected"
},
{
"version": "9.14.2.8",
"status": "affected"
},
{
"version": "9.14.2.13",
"status": "affected"
},
{
"version": "9.14.2.15",
"status": "affected"
},
{
"version": "9.14.3",
"status": "affected"
},
{
"version": "9.14.3.1",
"status": "affected"
},
{
"version": "9.14.3.9",
"status": "affected"
},
{
"version": "9.14.3.11",
"status": "affected"
},
{
"version": "9.14.3.13",
"status": "affected"
},
{
"version": "9.14.3.18",
"status": "affected"
},
{
"version": "9.14.3.15",
"status": "affected"
},
{
"version": "9.14.4",
"status": "affected"
},
{
"version": "9.14.4.6",
"status": "affected"
},
{
"version": "9.14.4.7",
"status": "affected"
},
{
"version": "9.14.4.12",
"status": "affected"
},
{
"version": "9.15.1",
"status": "affected"
},
{
"version": "9.15.1.7",
"status": "affected"
},
{
"version": "9.15.1.10",
"status": "affected"
},
{
"version": "9.15.1.15",
"status": "affected"
},
{
"version": "9.15.1.16",
"status": "affected"
},
{
"version": "9.15.1.17",
"status": "affected"
},
{
"version": "9.15.1.1",
"status": "affected"
},
{
"version": "9.15.1.21",
"status": "affected"
},
{
"version": "9.16.1",
"status": "affected"
},
{
"version": "9.16.1.28",
"status": "affected"
},
{
"version": "9.16.2",
"status": "affected"
},
{
"version": "9.16.2.3",
"status": "affected"
},
{
"version": "9.16.2.7",
"status": "affected"
},
{
"version": "9.16.2.11",
"status": "affected"
},
{
"version": "9.16.2.13",
"status": "affected"
},
{
"version": "9.16.2.14",
"status": "affected"
},
{
"version": "9.16.3",
"status": "affected"
},
{
"version": "9.16.3.3",
"status": "affected"
},
{
"version": "9.16.3.14",
"status": "affected"
},
{
"version": "9.17.1",
"status": "affected"
},
{
"version": "9.17.1.7",
"status": "affected"
},
{
"version": "9.17.1.9",
"status": "affected"
},
{
"version": "9.17.1.10",
"status": "affected"
},
{
"version": "9.17.1.11",
"status": "affected"
},
{
"version": "9.17.1.13",
"status": "affected"
},
{
"version": "9.17.1.15",
"status": "affected"
},
{
"version": "9.18.1",
"status": "affected"
}
]
},
{
"vendor": "Cisco",
"product": "Cisco Firepower Threat Defense Software",
"versions": [
{
"version": "6.6.0",
"status": "affected"
},
{
"version": "6.6.0.1",
"status": "affected"
},
{
"version": "6.6.1",
"status": "affected"
},
{
"version": "6.6.3",
"status": "affected"
},
{
"version": "6.6.4",
"status": "affected"
},
{
"version": "6.6.5",
"status": "affected"
},
{
"version": "6.6.5.1",
"status": "affected"
},
{
"version": "6.6.5.2",
"status": "affected"
},
{
"version": "6.7.0",
"status": "affected"
},
{
"version": "6.7.0.1",
"status": "affected"
},
{
"version": "6.7.0.2",
"status": "affected"
},
{
"version": "6.7.0.3",
"status": "affected"
},
{
"version": "7.0.0",
"status": "affected"
},
{
"version": "7.0.0.1",
"status": "affected"
},
{
"version": "7.0.1",
"status": "affected"
},
{
"version": "7.0.1.1",
"status": "affected"
},
{
"version": "7.0.2",
"status": "affected"
},
{
"version": "7.0.2.1",
"status": "affected"
},
{
"version": "7.0.3",
"status": "affected"
},
{
"version": "7.1.0",
"status": "affected"
},
{
"version": "7.1.0.1",
"status": "affected"
},
{
"version": "7.1.0.2",
"status": "affected"
},
{
"version": "7.2.0",
"status": "affected"
},
{
"version": "7.2.0.1",
"status": "affected"
}
]
}
]
More