First published: Fri Apr 07 2017(Updated: )
A vulnerability in the detection engine that handles Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process unexpectedly restarts. This vulnerability affects Cisco Firepower System Software prior to the first fixed release when it is configured with an SSL Decrypt-Resign policy. More Information: CSCvb62292. Known Affected Releases: 6.0.1 6.1.0 6.2.0. Known Fixed Releases: 6.2.0 6.1.0.2.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | =6.0.1 | |
Cisco Firepower Threat Defense | =6.1.0 | |
Cisco Firepower Threat Defense | =6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-3887 is considered high due to its potential to cause a denial of service.
To fix CVE-2017-3887, upgrade your Cisco Firepower Threat Defense software to the latest version as recommended by Cisco.
CVE-2017-3887 affects users of Cisco Firepower Threat Defense software versions 6.0.1, 6.1.0, and 6.2.0.
CVE-2017-3887 allows an unauthenticated remote attacker to trigger a denial of service condition.
There is no specific workaround for CVE-2017-3887; applying the recommended software updates is necessary.