A vulnerability in the SSL/TLS inspection of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series firewalls could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation for certain fields of specific SSL/TLS messages. An attacker could exploit this vulnerability by sending a malformed SSL/TLS message through an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. No manual intervention is needed to recover the device after it has reloaded.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ssl-dcrpt-dos-RYEkX4yy - Vendor Advisory |
Information
Published : 2020-10-21 19:15
Updated : 2024-11-21 05:31
NVD link : CVE-2020-3562
Mitre link : CVE-2020-3562
CVE.ORG link : CVE-2020-3562
JSON object : View
Products Affected
cisco
- firepower_2120
- firepower_threat_defense
- firepower_2130
- firepower_2140
- firepower_2110
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer