5.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
6.9 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.0%
A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file. This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device.
[
{
"vendor": "Cisco",
"product": "Cisco Firepower Threat Defense Software",
"versions": [
{
"version": "6.2.3",
"status": "affected"
},
{
"version": "6.2.3.1",
"status": "affected"
},
{
"version": "6.2.3.2",
"status": "affected"
},
{
"version": "6.2.3.3",
"status": "affected"
},
{
"version": "6.2.3.4",
"status": "affected"
},
{
"version": "6.2.3.5",
"status": "affected"
},
{
"version": "6.2.3.6",
"status": "affected"
},
{
"version": "6.2.3.7",
"status": "affected"
},
{
"version": "6.2.3.8",
"status": "affected"
},
{
"version": "6.2.3.10",
"status": "affected"
},
{
"version": "6.2.3.11",
"status": "affected"
},
{
"version": "6.2.3.9",
"status": "affected"
},
{
"version": "6.2.3.12",
"status": "affected"
},
{
"version": "6.2.3.13",
"status": "affected"
},
{
"version": "6.2.3.14",
"status": "affected"
},
{
"version": "6.2.3.15",
"status": "affected"
},
{
"version": "6.2.3.16",
"status": "affected"
},
{
"version": "6.2.3.17",
"status": "affected"
},
{
"version": "6.2.3.18",
"status": "affected"
},
{
"version": "6.6.0",
"status": "affected"
},
{
"version": "6.6.0.1",
"status": "affected"
},
{
"version": "6.6.1",
"status": "affected"
},
{
"version": "6.6.3",
"status": "affected"
},
{
"version": "6.6.4",
"status": "affected"
},
{
"version": "6.6.5",
"status": "affected"
},
{
"version": "6.6.5.1",
"status": "affected"
},
{
"version": "6.6.5.2",
"status": "affected"
},
{
"version": "6.6.7",
"status": "affected"
},
{
"version": "6.6.7.1",
"status": "affected"
},
{
"version": "6.6.7.2",
"status": "affected"
},
{
"version": "6.4.0",
"status": "affected"
},
{
"version": "6.4.0.1",
"status": "affected"
},
{
"version": "6.4.0.3",
"status": "affected"
},
{
"version": "6.4.0.2",
"status": "affected"
},
{
"version": "6.4.0.4",
"status": "affected"
},
{
"version": "6.4.0.5",
"status": "affected"
},
{
"version": "6.4.0.6",
"status": "affected"
},
{
"version": "6.4.0.7",
"status": "affected"
},
{
"version": "6.4.0.8",
"status": "affected"
},
{
"version": "6.4.0.9",
"status": "affected"
},
{
"version": "6.4.0.10",
"status": "affected"
},
{
"version": "6.4.0.11",
"status": "affected"
},
{
"version": "6.4.0.12",
"status": "affected"
},
{
"version": "6.4.0.13",
"status": "affected"
},
{
"version": "6.4.0.14",
"status": "affected"
},
{
"version": "6.4.0.15",
"status": "affected"
},
{
"version": "6.4.0.16",
"status": "affected"
},
{
"version": "6.7.0",
"status": "affected"
},
{
"version": "6.7.0.1",
"status": "affected"
},
{
"version": "6.7.0.2",
"status": "affected"
},
{
"version": "6.7.0.3",
"status": "affected"
},
{
"version": "7.0.0",
"status": "affected"
},
{
"version": "7.0.0.1",
"status": "affected"
},
{
"version": "7.0.1",
"status": "affected"
},
{
"version": "7.0.1.1",
"status": "affected"
},
{
"version": "7.0.2",
"status": "affected"
},
{
"version": "7.0.2.1",
"status": "affected"
},
{
"version": "7.0.3",
"status": "affected"
},
{
"version": "7.0.4",
"status": "affected"
},
{
"version": "7.0.5",
"status": "affected"
},
{
"version": "7.1.0",
"status": "affected"
},
{
"version": "7.1.0.1",
"status": "affected"
},
{
"version": "7.1.0.3",
"status": "affected"
},
{
"version": "7.2.0",
"status": "affected"
},
{
"version": "7.2.0.1",
"status": "affected"
},
{
"version": "7.2.1",
"status": "affected"
},
{
"version": "7.2.2",
"status": "affected"
},
{
"version": "7.2.3",
"status": "affected"
},
{
"version": "7.2.4",
"status": "affected"
},
{
"version": "7.3.0",
"status": "affected"
},
{
"version": "7.3.1",
"status": "affected"
},
{
"version": "7.3.1.1",
"status": "affected"
},
{
"version": "7.3.1.2",
"status": "affected"
}
]
}
]
5.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
6.9 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.0%