CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS
Percentile
58.8%
A vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to a memory handling error that occurs when GRE traffic is processed. An attacker could exploit this vulnerability by sending a crafted GRE payload through an affected device. A successful exploit could allow the attacker to cause the device to restart, resulting in a DoS condition.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM”]
This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | firepower_threat_defense | * | cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 7.1.0.0 | cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.0:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 7.1.0.1 | cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:* |
cisco | firepower_threat_defense | 7.1.0.2 | cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:* |
[
{
"vendor": "Cisco",
"product": "Cisco Firepower Threat Defense Software",
"versions": [
{
"version": "6.6.0",
"status": "affected"
},
{
"version": "6.6.0.1",
"status": "affected"
},
{
"version": "6.6.1",
"status": "affected"
},
{
"version": "6.6.3",
"status": "affected"
},
{
"version": "6.6.4",
"status": "affected"
},
{
"version": "6.6.5",
"status": "affected"
},
{
"version": "6.6.5.1",
"status": "affected"
},
{
"version": "6.6.5.2",
"status": "affected"
},
{
"version": "6.4.0",
"status": "affected"
},
{
"version": "6.4.0.1",
"status": "affected"
},
{
"version": "6.4.0.3",
"status": "affected"
},
{
"version": "6.4.0.2",
"status": "affected"
},
{
"version": "6.4.0.4",
"status": "affected"
},
{
"version": "6.4.0.5",
"status": "affected"
},
{
"version": "6.4.0.6",
"status": "affected"
},
{
"version": "6.4.0.7",
"status": "affected"
},
{
"version": "6.4.0.8",
"status": "affected"
},
{
"version": "6.4.0.9",
"status": "affected"
},
{
"version": "6.4.0.10",
"status": "affected"
},
{
"version": "6.4.0.11",
"status": "affected"
},
{
"version": "6.4.0.12",
"status": "affected"
},
{
"version": "6.4.0.13",
"status": "affected"
},
{
"version": "6.4.0.14",
"status": "affected"
},
{
"version": "6.4.0.15",
"status": "affected"
},
{
"version": "6.7.0",
"status": "affected"
},
{
"version": "6.7.0.1",
"status": "affected"
},
{
"version": "6.7.0.2",
"status": "affected"
},
{
"version": "6.7.0.3",
"status": "affected"
},
{
"version": "7.0.0",
"status": "affected"
},
{
"version": "7.0.0.1",
"status": "affected"
},
{
"version": "7.0.1",
"status": "affected"
},
{
"version": "7.0.1.1",
"status": "affected"
},
{
"version": "7.0.2",
"status": "affected"
},
{
"version": "7.0.2.1",
"status": "affected"
},
{
"version": "7.0.3",
"status": "affected"
},
{
"version": "7.1.0",
"status": "affected"
},
{
"version": "7.1.0.1",
"status": "affected"
},
{
"version": "7.1.0.2",
"status": "affected"
}
]
}
]
More