7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
45.4%
A vulnerability in the SSL/TLS client of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper memory management when a device initiates SSL/TLS connections. An attacker could exploit this vulnerability by ensuring that the device will connect to an SSL/TLS server that is using specific encryption parameters. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.
[
{
"vendor": "Cisco",
"product": "Cisco Adaptive Security Appliance (ASA) Software",
"versions": [
{
"version": "9.14.1",
"status": "affected"
},
{
"version": "9.14.1.10",
"status": "affected"
},
{
"version": "9.14.1.15",
"status": "affected"
},
{
"version": "9.14.1.19",
"status": "affected"
},
{
"version": "9.14.1.30",
"status": "affected"
},
{
"version": "9.14.2",
"status": "affected"
},
{
"version": "9.14.2.4",
"status": "affected"
},
{
"version": "9.14.2.8",
"status": "affected"
},
{
"version": "9.14.2.13",
"status": "affected"
},
{
"version": "9.14.2.15",
"status": "affected"
},
{
"version": "9.14.3",
"status": "affected"
},
{
"version": "9.14.3.1",
"status": "affected"
},
{
"version": "9.14.3.9",
"status": "affected"
},
{
"version": "9.14.3.11",
"status": "affected"
},
{
"version": "9.14.3.13",
"status": "affected"
},
{
"version": "9.14.3.18",
"status": "affected"
},
{
"version": "9.14.3.15",
"status": "affected"
},
{
"version": "9.15.1",
"status": "affected"
},
{
"version": "9.15.1.7",
"status": "affected"
},
{
"version": "9.15.1.10",
"status": "affected"
},
{
"version": "9.15.1.15",
"status": "affected"
},
{
"version": "9.15.1.16",
"status": "affected"
},
{
"version": "9.15.1.17",
"status": "affected"
},
{
"version": "9.15.1.1",
"status": "affected"
},
{
"version": "9.15.1.21",
"status": "affected"
}
]
},
{
"vendor": "Cisco",
"product": "Cisco Firepower Threat Defense Software",
"versions": [
{
"version": "6.6.0",
"status": "affected"
},
{
"version": "6.6.0.1",
"status": "affected"
},
{
"version": "6.6.1",
"status": "affected"
},
{
"version": "6.6.3",
"status": "affected"
},
{
"version": "6.6.4",
"status": "affected"
},
{
"version": "6.6.5",
"status": "affected"
},
{
"version": "6.6.5.1",
"status": "affected"
},
{
"version": "6.6.5.2",
"status": "affected"
},
{
"version": "6.7.0",
"status": "affected"
},
{
"version": "6.7.0.1",
"status": "affected"
},
{
"version": "6.7.0.2",
"status": "affected"
},
{
"version": "6.7.0.3",
"status": "affected"
}
]
},
{
"vendor": "Cisco",
"product": "Cisco FirePOWER Services Software for ASA",
"versions": [
{
"version": "N/A",
"status": "affected"
}
]
}
]
More