CVE-2020-3283
Published May 6, 2020
Last updated 3 years ago
Overview
- Description
- A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) handler of Cisco Firepower Threat Defense (FTD) Software when running on the Cisco Firepower 1000 Series platform could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to a communication error between internal functions. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause a buffer underrun, which leads to a crash. The crash causes the affected device to reload.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.6
- Impact score
- 4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 8.6
- Impact score
- 4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06741056-2BFD-4F88-917A-F581F813B69E", "versionEndExcluding": "6.4.0.9", "versionStartIncluding": "6.4.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7FFE3880-4B85-4E23-9836-70875D5109F7" }, { "criteria": "cpe:2.3:h:cisco:firepower_1020:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EA8B5AF8-6A57-482A-9442-E857EE7E207B" }, { "criteria": "cpe:2.3:h:cisco:firepower_1030:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A9929280-2AAC-4B56-A42C-1F6EDE83988E" }, { "criteria": "cpe:2.3:h:cisco:firepower_1040:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F29B6BC3-D716-4A3D-9679-B7BE81F719C8" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5505_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D0B3813-F3A0-4513-828B-7990F899DA48" }, { "criteria": "cpe:2.3:o:cisco:asa_5505_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAEA9C9F-F72A-4265-A5F6-A9D9A541991C" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5510_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58E04E88-F836-4220-9961-C46D5AF2285F" }, { "criteria": "cpe:2.3:o:cisco:asa_5510_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD25D50A-C319-453A-8690-38747CC061E5" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B091B9BA-D4CA-435B-8D66-602B45F0E0BD" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83524681-0B3A-492A-BBA5-1E905529EEF0" }, { "criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED129635-7BB2-43FC-9FE9-C269E9D30BC4" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "08F0F160-DAD2-48D4-B7B2-4818B2526F35" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A289F236-9D8D-4E6D-9E48-FD62E6AA5A2F" }, { "criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DADAFCF-C950-4B8D-B88A-A446D1DA3635" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "977D597B-F6DE-4438-AB02-06BE64D71EBE" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5520_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10409979-E312-48FA-B690-4851C602652A" }, { "criteria": "cpe:2.3:o:cisco:asa_5520_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65FE5EA5-1AD2-4FA6-9D3A-D21CDB7DA037" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2B387F62-6341-434D-903F-9B72E7F84ECB" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E517D3B-C730-4CD8-B15A-10151D81A1DF" }, { "criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB3A269B-1C99-4D54-810A-389AF6F2B717" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EB71EB29-0115-4307-A9F7-262394FD9FB0" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5540_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2F4D4E6-E1AD-4B07-8DDF-B57C2A0EDC65" }, { "criteria": "cpe:2.3:o:cisco:asa_5540_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50AAD56A-2238-4A94-A4E6-15DB26751EBC" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "17C5A524-E1D9-480F-B655-0680AA5BF720" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58E83502-8147-4B06-93E6-506154C7F120" }, { "criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F33C4821-430E-4962-8A1A-4E5353303507" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "57179F60-E330-4FF0-9664-B1E4637FF210" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5550_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C953E75-EA5F-4FA5-927B-1F7E431B9C86" }, { "criteria": "cpe:2.3:o:cisco:asa_5550_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB1467EB-0AFB-4792-8DB8-9F134FA1529D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E6287D95-F564-44B7-A0F9-91396D7C2C4E" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7126BDC6-13A8-4ABB-824B-DE71C73095CE" }, { "criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0DBF19E-F275-461E-9BD2-EA8645289407" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5535C936-391B-4619-AA03-B35265FC15D7" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5580_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "188196CB-F5AE-4A6F-ABF6-3BF8CF43485D" }, { "criteria": "cpe:2.3:o:cisco:asa_5580_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44ABBDC4-BB79-41F5-8BF9-46779098DE91" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D1E828B8-5ECC-4A09-B2AD-DEDC558713DE" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7DEA476-508E-4354-9602-56D305A85A0C" }, { "criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "062210FE-2A86-478F-90B1-DDEAE35639B9" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "16AE20C2-C77E-4E04-BF13-A48696E52426" } ], "operator": "OR" } ], "operator": "AND" } ]