{"id": "CVE-2020-3188", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 3.9}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 3.9}]}, "published": "2020-05-06T17:15:12.150", "references": [{"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-613"}]}, {"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-399"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only."}, {"lang": "es", "value": "Una vulnerabilidad en como el Cisco Firepower Threat Defense (FTD) Software maneja los tiempos de espera de sesi\u00f3n para las conexiones de administraci\u00f3n, podr\u00eda permitir a un atacante remoto no autenticado causar una acumulaci\u00f3n de conexiones de administraci\u00f3n remota en un dispositivo afectado, lo que podr\u00eda resultar en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad se presenta porque el per\u00edodo de tiempo de espera de la sesi\u00f3n predeterminada para conexiones de administraci\u00f3n remota espec\u00edficas es demasiado largo. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un n\u00famero grande y sostenido de conexiones de administraci\u00f3n remota dise\u00f1adas sobre un dispositivo afectado, resultando en una acumulaci\u00f3n de esas conexiones sobre el tiempo. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante causar que la interfaz de administraci\u00f3n remota o el Cisco Firepower Device Manager (FDM) dejen de responder y cause que otras funciones de administraci\u00f3n se desconecten, resultando en una condici\u00f3n DoS. El tr\u00e1fico del usuario que fluye a trav\u00e9s del dispositivo no estar\u00eda afectado, y la condici\u00f3n DoS estar\u00eda aislada para la administraci\u00f3n remota solamente."}], "lastModified": "2021-08-12T18:18:33.027", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06741056-2BFD-4F88-917A-F581F813B69E", "versionEndExcluding": "6.4.0.9", "versionStartIncluding": "6.4.0"}, {"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3ED0E59C-146C-494F-AD46-F6FB43F9C575", "versionEndExcluding": "6.5.0.5", "versionStartIncluding": "6.5.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D20B7556-CB33-4E96-8B4A-4E70C350079D"}, {"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51DFD14D-033B-4AA3-B7C6-E5CE9EEF69DD"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5510_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DC4AD47-1789-494E-949F-483CBC2EDF4A"}, {"criteria": "cpe:2.3:o:cisco:asa_5510_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A9AF36E-F7F0-4A0E-B95D-2DF5584D5072"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B091B9BA-D4CA-435B-8D66-602B45F0E0BD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39AC2543-8397-4CAD-A87C-10AD2F5672A2"}, {"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70CC1F85-2E5C-4939-9879-417484C58F5A"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "08F0F160-DAD2-48D4-B7B2-4818B2526F35"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "715FA7AF-438C-4B73-B411-F5242D82E6DE"}, {"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "028C5F69-DBAB-42DA-A759-555FACE4CF08"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "977D597B-F6DE-4438-AB02-06BE64D71EBE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5520_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C833630-408A-4491-88E3-F8F50BC0988E"}, {"criteria": "cpe:2.3:o:cisco:asa_5520_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD20CA7A-9EF1-4BA5-883E-EB9791AB1982"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2B387F62-6341-434D-903F-9B72E7F84ECB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "400F4C4E-75A0-420C-A3D0-35EBCA9439C9"}, {"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76F77E11-71F3-4197-871F-FEA1E53D7CFB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EB71EB29-0115-4307-A9F7-262394FD9FB0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5540_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28EE51A4-C914-4B9C-B483-A56E0AAA788F"}, {"criteria": "cpe:2.3:o:cisco:asa_5540_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33A3EB45-FDC6-4BAB-9E6D-96A463C1A9B3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "17C5A524-E1D9-480F-B655-0680AA5BF720"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA31C6C9-EC1F-4548-AF39-FD49DD98BBBE"}, {"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AA06D7D-A0BA-4B17-9EF3-165A203F8921"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "57179F60-E330-4FF0-9664-B1E4637FF210"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5550_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C6DCED6-241A-4FB6-B2A4-B4E4DD3B7547"}, {"criteria": "cpe:2.3:o:cisco:asa_5550_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "414DE2B9-AE0A-4DE4-9D0A-8C1E11AF85D3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E6287D95-F564-44B7-A0F9-91396D7C2C4E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "611D736A-1C49-4FF7-BC6B-01D735771450"}, {"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E584FE6-A477-4EFE-B562-35FC65229F26"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5535C936-391B-4619-AA03-B35265FC15D7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2CBAFBF-8727-43F3-9C9E-E3CCCF93BE29"}, {"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B400A5F1-2DDA-4881-AB68-3F59262C981D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D1E828B8-5ECC-4A09-B2AD-DEDC558713DE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE020E81-C231-4975-9695-ECE383C32B2F"}, {"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8D5DAF8-D27D-41A7-9912-580D657557E0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "16AE20C2-C77E-4E04-BF13-A48696E52426"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}