First published: Thu Feb 08 2018(Updated: )
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass file policies that are configured to block files transmitted to an affected device via the BitTorrent protocol. The vulnerability exists because the affected software does not detect BitTorrent handshake messages correctly. An attacker could exploit this vulnerability by sending a crafted BitTorrent connection request to an affected device. A successful exploit could allow the attacker to bypass file policies that are configured to block files transmitted to the affected device via the BitTorrent protocol. Cisco Bug IDs: CSCve26946.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | =6.1.0 | |
Cisco Firepower Threat Defense | =6.2.0 | |
Cisco Firepower Threat Defense | =6.2.2 | |
Cisco Firepower Threat Defense | =6.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0138 has been classified with a medium severity level.
To address CVE-2018-0138, you should upgrade the Cisco Firepower Threat Defense to version 6.2.4 or later.
CVE-2018-0138 affects Cisco Firepower Threat Defense versions 6.1.0, 6.2.0, 6.2.2, and 6.2.3.
Yes, CVE-2018-0138 can be exploited by unauthenticated remote attackers.
CVE-2018-0138 enables attackers to bypass file policies blocking BitTorrent protocol transmissions.