First published: Thu Apr 19 2018(Updated: )
A vulnerability in the Secure Sockets Layer (SSL) Engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper error handling while processing SSL traffic. An attacker could exploit this vulnerability by sending a large volume of crafted SSL traffic to the vulnerable device. A successful exploit could allow the attacker to degrade the device performance by triggering a persistent high CPU utilization condition. Cisco Bug IDs: CSCvh89340.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower | =6.2.1 | |
Cisco Firepower | =6.2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0272 is a vulnerability in the Secure Sockets Layer (SSL) Engine of Cisco Firepower System Software that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
CVE-2018-0272 has a severity rating of 5.9 (medium severity).
CVE-2018-0272 affects Cisco Firepower System Software versions 6.2.1 and 6.2.2.1.
An attacker could exploit CVE-2018-0272 by sending specially crafted SSL traffic to the vulnerable system.
Yes, you can find more information about this vulnerability at the following references: [SecurityFocus](http://www.securityfocus.com/bid/103925) and [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-firepower).