Lucene search

K
nvd[email protected]NVD:CVE-2020-3179
HistoryMay 06, 2020 - 5:15 p.m.

CVE-2020-3179

2020-05-0617:15:11
CWE-415
web.nvd.nist.gov
7

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.7

Confidence

High

EPSS

0.002

Percentile

52.6%

A vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory handling error when GRE over IPv6 traffic is processed. An attacker could exploit this vulnerability by sending crafted GRE over IPv6 packets with either IPv4 or IPv6 payload through an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition.

Affected configurations

Nvd
Node
ciscofirepower_threat_defenseRange6.3.06.3.0.5
OR
ciscofirepower_threat_defenseRange6.4.06.4.0.6
Node
ciscoasa_5505Match-
AND
ciscoasa_5505_firmwareMatch9.9\(2\)
OR
ciscoasa_5505_firmwareMatch101.5\(1.26\)
Node
ciscoasa_5510Match-
AND
ciscoasa_5510_firmwareMatch9.9\(2\)
OR
ciscoasa_5510_firmwareMatch101.5\(1.26\)
Node
ciscoasa_5512-xMatch-
AND
ciscoasa_5512-x_firmwareMatch9.9\(2\)
OR
ciscoasa_5512-x_firmwareMatch101.5\(1.26\)
Node
ciscoasa_5515-xMatch-
AND
ciscoasa_5515-x_firmwareMatch9.9\(2\)
OR
ciscoasa_5515-x_firmwareMatch101.5\(1.26\)
Node
ciscoasa_5520Match-
AND
ciscoasa_5520_firmwareMatch9.9\(2\)
OR
ciscoasa_5520_firmwareMatch101.5\(1.26\)
Node
ciscoasa_5525-xMatch-
AND
ciscoasa_5525-x_firmwareMatch9.9\(2\)
OR
ciscoasa_5525-x_firmwareMatch101.5\(1.26\)
Node
ciscoasa_5540Match-
AND
ciscoasa_5540_firmwareMatch9.9\(2\)
OR
ciscoasa_5540_firmwareMatch101.5\(1.26\)
Node
ciscoasa_5545-xMatch-
AND
ciscoasa_5545-x_firmwareMatch9.9\(2\)
OR
ciscoasa_5545-x_firmwareMatch101.5\(1.26\)
Node
ciscoasa_5550_firmwareMatch9.9\(2\)
OR
ciscoasa_5550_firmwareMatch101.5\(1.26\)
AND
ciscoasa_5550Match-
Node
ciscoasa_5555-x_firmwareMatch9.9\(2\)
OR
ciscoasa_5555-x_firmwareMatch101.5\(1.26\)
AND
ciscoasa_5555-xMatch-
Node
ciscoasa_5580_firmwareMatch9.9\(2\)
OR
ciscoasa_5580_firmwareMatch101.5\(1.26\)
AND
ciscoasa_5580Match-
Node
ciscoasa_5585-x_firmwareMatch9.9\(2\)
OR
ciscoasa_5585-x_firmwareMatch101.5\(1.26\)
AND
ciscoasa_5585-xMatch-
VendorProductVersionCPE
ciscofirepower_threat_defense*cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
ciscoasa_5505-cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*
ciscoasa_5505_firmware9.9(2)cpe:2.3:o:cisco:asa_5505_firmware:9.9\(2\):*:*:*:*:*:*:*
ciscoasa_5505_firmware101.5(1.26)cpe:2.3:o:cisco:asa_5505_firmware:101.5\(1.26\):*:*:*:*:*:*:*
ciscoasa_5510-cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*
ciscoasa_5510_firmware9.9(2)cpe:2.3:o:cisco:asa_5510_firmware:9.9\(2\):*:*:*:*:*:*:*
ciscoasa_5510_firmware101.5(1.26)cpe:2.3:o:cisco:asa_5510_firmware:101.5\(1.26\):*:*:*:*:*:*:*
ciscoasa_5512-x-cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*
ciscoasa_5512-x_firmware9.9(2)cpe:2.3:o:cisco:asa_5512-x_firmware:9.9\(2\):*:*:*:*:*:*:*
ciscoasa_5512-x_firmware101.5(1.26)cpe:2.3:o:cisco:asa_5512-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
Rows per page:
1-10 of 371

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.7

Confidence

High

EPSS

0.002

Percentile

52.6%

Related for NVD:CVE-2020-3179