A vulnerability in the implementation of the Border Gateway Protocol (BGP) module in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain BGP packets. An attacker could exploit this vulnerability by sending a crafted BGP packet. A successful exploit could allow the attacker to cause a DoS condition on the affected device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-dos-P43GCE5j | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
16 Aug 2023, 16:17
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco adaptive Security Appliance Software
|
|
CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* |
Information
Published : 2020-05-06 17:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-3305
Mitre link : CVE-2020-3305
CVE.ORG link : CVE-2020-3305
JSON object : View
Products Affected
cisco
- asa_5550
- adaptive_security_appliance
- asa_5515-x
- asa_5555-x
- firepower_threat_defense
- asa_5580
- asa_5520
- asa_5505
- asa_5585-x
- asa_5525-x
- adaptive_security_appliance_software
- asa_5510
- asa_5512-x
CWE
CWE-400
Uncontrolled Resource Consumption