Lucene search

K
ciscoCiscoCISCO-SA-20180516-FIREPWR-PB
HistoryMay 16, 2018 - 4:00 p.m.

Cisco Firepower Threat Defense Software Policy Bypass Vulnerability

2018-05-1616:00:00
tools.cisco.com
23

EPSS

0.001

Percentile

40.1%

A vulnerability in the detection engine of Cisco Firepower Threat Defense software could allow an unauthenticated, remote attacker to bypass a configured Secure Sockets Layer (SSL) Access Control (AC) policy to block SSL traffic.

The vulnerability is due to the incorrect handling of TCP SSL packets received out of order. An attacker could exploit this vulnerability by sending a crafted SSL connection through the affected device. A successful exploit could allow the attacker to bypass a configured SSL AC policy to block SSL traffic.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-firepwr-pb [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-firepwr-pb”]

Affected configurations

Vulners
Node
ciscofirepower_threat_defense_softwareMatchany
OR
ciscofirepower_threat_defense_softwareMatchany
VendorProductVersionCPE
ciscofirepower_threat_defense_softwareanycpe:2.3:a:cisco:firepower_threat_defense_software:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

40.1%

Related for CISCO-SA-20180516-FIREPWR-PB