Lucene search

K
ciscoCiscoCISCO-SA-20170405-CFPW
HistoryApr 05, 2017 - 4:00 p.m.

Cisco Firepower Detection Engine SSL Denial of Service Vulnerability

2017-04-0516:00:00
tools.cisco.com
8

0.001 Low

EPSS

Percentile

48.1%

A vulnerability in the detection engine reassembly of Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process consumes a high level of CPU resources.

The vulnerability is due to improper handling of an SSL packet stream. An attacker could exploit this vulnerability by sending a crafted SSL packet stream to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition because the Snort process consumes a high level of CPU resources. The device must be manually reloaded to recover from this condition.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw”]

Affected configurations

Vulners
Node
ciscofirepower_management_centerMatch6.0
OR
ciscofirepower_management_centerMatch6.1
OR
ciscofirepower_management_centerMatch6.2
OR
ciscofirepower_management_centerMatch6.0.0
OR
ciscofirepower_management_centerMatch6.1.0
OR
ciscofirepower_management_centerMatch6.2.0
OR
ciscofirepower_management_centerMatch6.2.1

0.001 Low

EPSS

Percentile

48.1%

Related for CISCO-SA-20170405-CFPW