First published: Mon May 22 2017(Updated: )
A vulnerability in the logging configuration of Secure Sockets Layer (SSL) policies for Cisco FirePOWER System Software 5.3.0 through 6.2.2 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources. The vulnerability is due to the logging of certain TCP packets by the affected software. An attacker could exploit this vulnerability by sending a flood of crafted TCP packets to an affected device. A successful exploit could allow the attacker to cause a DoS condition. The success of an exploit is dependent on how an administrator has configured logging for SSL policies for a device. This vulnerability affects Cisco FirePOWER System Software that is configured to log connections by using SSL policy default actions. Cisco Bug IDs: CSCvd07072.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | =5.3.0 | |
Cisco Firepower Threat Defense | =5.4.0 | |
Cisco Firepower Threat Defense | =6.0.0 | |
Cisco Firepower Threat Defense | =6.0.1 | |
Cisco Firepower Threat Defense | =6.0.1.3 | |
Cisco Firepower Threat Defense | =6.1.0 | |
Cisco Firepower Threat Defense | =6.1.0.2 | |
Cisco Firepower Threat Defense | =6.2.0 | |
Cisco Firepower Threat Defense | =6.2.1 | |
Cisco Firepower Threat Defense | =6.2.2 | |
Cisco Firepower Threat Defense | =6.2_base |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.