First published: Fri Apr 07 2017(Updated: )
A vulnerability in the detection engine reassembly of Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process consumes a high level of CPU resources. Affected Products: This vulnerability affects Cisco Firepower System Software running software releases 6.0.0, 6.1.0, 6.2.0, or 6.2.1 when the device is configured with an SSL policy that has at least one rule specifying traffic decryption. More Information: CSCvc58563. Known Affected Releases: 6.0.0 6.1.0 6.2.0 6.2.1.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Firewall Management Center | =6.0.0 | |
Cisco Secure Firewall Management Center | =6.1.0 | |
Cisco Secure Firewall Management Center | =6.2.0 | |
Cisco Secure Firewall Management Center | =6.2.1 | |
Cisco Firepower Management Center Software | =6.0.0 | |
Cisco Firepower Management Center Software | =6.1.0 | |
Cisco Firepower Management Center Software | =6.2.0 | |
Cisco Firepower Management Center Software | =6.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3885 has a medium severity rating due to its potential to lead to a denial of service condition.
To fix CVE-2017-3885, it is recommended to upgrade to a fixed version of Cisco Secure Firewall Management Center or Cisco Firepower Management Center Software.
CVE-2017-3885 affects Cisco Secure Firewall Management Center and Cisco Firepower Management Center software versions 6.0.0 through 6.2.1.
Yes, CVE-2017-3885 can be exploited by an unauthenticated remote attacker.
The impact of CVE-2017-3885 on affected systems is high CPU resource consumption, potentially leading to service outage.