Lucene search

K
ciscoCiscoCISCO-SA-20180418-FSS1
HistoryApr 18, 2018 - 4:00 p.m.

Cisco Firepower System Software Server Message Block File Policy Bypass Vulnerability

2018-04-1816:00:00
tools.cisco.com
27

0.001 Low

EPSS

Percentile

40.2%

A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a configured file action policy to drop the Server Message Block (SMB) protocol if a malware file is detected.

The vulnerability is due to how the SMB protocol handles a case in which a large file transfer fails. This case occurs when some pieces of the file are successfully transferred to the remote endpoint, but ultimately the file transfer fails and is reset. An attacker could exploit this vulnerability by sending a crafted SMB file transfer request through the targeted device. An exploit could allow the attacker to pass an SMB file that contains malware, which the device is configured to block.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss1 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss1”]

Affected configurations

Vulners
Node
ciscofirepower_threat_defense_softwareMatchany
OR
ciscofirepower_threat_defense_softwareMatchany

0.001 Low

EPSS

Percentile

40.2%

Related for CISCO-SA-20180418-FSS1