CVE-2017-6632
Published May 22, 2017
Last updated 5 years ago
Overview
- Description
- A vulnerability in the logging configuration of Secure Sockets Layer (SSL) policies for Cisco FirePOWER System Software 5.3.0 through 6.2.2 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources. The vulnerability is due to the logging of certain TCP packets by the affected software. An attacker could exploit this vulnerability by sending a flood of crafted TCP packets to an affected device. A successful exploit could allow the attacker to cause a DoS condition. The success of an exploit is dependent on how an administrator has configured logging for SSL policies for a device. This vulnerability affects Cisco FirePOWER System Software that is configured to log connections by using SSL policy default actions. Cisco Bug IDs: CSCvd07072.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:5.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DB13378-A7CB-4EBB-B3FD-57F7F37965ED" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:5.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D850EEF9-1967-4CE5-A30C-50180849BCAD" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1AC6A67-82EF-4D31-AFCB-499A0C6EC0F8" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "995667FD-35F1-49E5-96DB-2FDFF5E0B523" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.0.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC18DB34-8F0D-466A-BDEF-362760804A00" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61FB47CF-2A6A-4121-BFF7-5862E163B8E5" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9873ABAC-9A3D-40E1-B7FF-F2AB74F82C22" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DC52A8B-7DF4-47B2-9F49-627F59656E5E" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD48BE40-C647-429A-81B6-59E125BBE415" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42496A5B-1644-4088-BBCF-2ED810A5694B" }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2_base:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95056402-3BC3-4B4C-9A85-BEF53014181D" } ], "operator": "OR" } ] } ]