{"id": "CVE-2020-3283", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "CHANGED", "version": "3.0", "baseScore": 8.6, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 3.9}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.6, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 3.9}]}, "published": "2020-05-06T17:15:12.837", "references": [{"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-4v5nmWtZ", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-787"}]}, {"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) handler of Cisco Firepower Threat Defense (FTD) Software when running on the Cisco Firepower 1000 Series platform could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to a communication error between internal functions. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause a buffer underrun, which leads to a crash. The crash causes the affected device to reload."}, {"lang": "es", "value": "Una vulnerabilidad en el manejador de Secure Sockets Layer (SSL)/Transport Layer Security (TLS) del Cisco Firepower Threat Defense (FTD) Software cuando se ejecuta en la plataforma Cisco Firepower 1000 Series, podr\u00eda permitir a un atacante remoto no autenticado desencadenar una denegaci\u00f3n de servicio ( DoS) sobre un dispositivo afectado. La vulnerabilidad es debido a un error de comunicaci\u00f3n entre funciones internas. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un mensaje SSL/TLS dise\u00f1ado hacia un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante causar una subdesbordamiento del b\u00fafer, que conlleva a un bloqueo. El bloqueo causa que el dispositivo afectado se sobrecargue."}], "lastModified": "2021-09-17T19:22:55.150", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06741056-2BFD-4F88-917A-F581F813B69E", "versionEndExcluding": "6.4.0.9", "versionStartIncluding": "6.4.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7FFE3880-4B85-4E23-9836-70875D5109F7"}, {"criteria": "cpe:2.3:h:cisco:firepower_1020:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EA8B5AF8-6A57-482A-9442-E857EE7E207B"}, {"criteria": "cpe:2.3:h:cisco:firepower_1030:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A9929280-2AAC-4B56-A42C-1F6EDE83988E"}, {"criteria": "cpe:2.3:h:cisco:firepower_1040:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F29B6BC3-D716-4A3D-9679-B7BE81F719C8"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D0B3813-F3A0-4513-828B-7990F899DA48"}, {"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAEA9C9F-F72A-4265-A5F6-A9D9A541991C"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5510_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58E04E88-F836-4220-9961-C46D5AF2285F"}, {"criteria": "cpe:2.3:o:cisco:asa_5510_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD25D50A-C319-453A-8690-38747CC061E5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B091B9BA-D4CA-435B-8D66-602B45F0E0BD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83524681-0B3A-492A-BBA5-1E905529EEF0"}, {"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED129635-7BB2-43FC-9FE9-C269E9D30BC4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "08F0F160-DAD2-48D4-B7B2-4818B2526F35"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A289F236-9D8D-4E6D-9E48-FD62E6AA5A2F"}, {"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DADAFCF-C950-4B8D-B88A-A446D1DA3635"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "977D597B-F6DE-4438-AB02-06BE64D71EBE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5520_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10409979-E312-48FA-B690-4851C602652A"}, {"criteria": "cpe:2.3:o:cisco:asa_5520_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65FE5EA5-1AD2-4FA6-9D3A-D21CDB7DA037"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2B387F62-6341-434D-903F-9B72E7F84ECB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E517D3B-C730-4CD8-B15A-10151D81A1DF"}, {"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB3A269B-1C99-4D54-810A-389AF6F2B717"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EB71EB29-0115-4307-A9F7-262394FD9FB0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5540_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2F4D4E6-E1AD-4B07-8DDF-B57C2A0EDC65"}, {"criteria": "cpe:2.3:o:cisco:asa_5540_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50AAD56A-2238-4A94-A4E6-15DB26751EBC"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "17C5A524-E1D9-480F-B655-0680AA5BF720"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58E83502-8147-4B06-93E6-506154C7F120"}, {"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F33C4821-430E-4962-8A1A-4E5353303507"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "57179F60-E330-4FF0-9664-B1E4637FF210"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5550_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C953E75-EA5F-4FA5-927B-1F7E431B9C86"}, {"criteria": "cpe:2.3:o:cisco:asa_5550_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB1467EB-0AFB-4792-8DB8-9F134FA1529D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E6287D95-F564-44B7-A0F9-91396D7C2C4E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7126BDC6-13A8-4ABB-824B-DE71C73095CE"}, {"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0DBF19E-F275-461E-9BD2-EA8645289407"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5535C936-391B-4619-AA03-B35265FC15D7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "188196CB-F5AE-4A6F-ABF6-3BF8CF43485D"}, {"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44ABBDC4-BB79-41F5-8BF9-46779098DE91"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D1E828B8-5ECC-4A09-B2AD-DEDC558713DE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7DEA476-508E-4354-9602-56D305A85A0C"}, {"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "062210FE-2A86-478F-90B1-DDEAE35639B9"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "16AE20C2-C77E-4E04-BF13-A48696E52426"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}