First published: Thu May 17 2018(Updated: )
A vulnerability in the detection engine of Cisco Firepower Threat Defense software could allow an unauthenticated, remote attacker to bypass a configured Secure Sockets Layer (SSL) Access Control (AC) policy to block SSL traffic. The vulnerability is due to the incorrect handling of TCP SSL packets received out of order. An attacker could exploit this vulnerability by sending a crafted SSL connection through the affected device. A successful exploit could allow the attacker to bypass a configured SSL AC policy to block SSL traffic. Cisco Bug IDs: CSCvg09316.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | =6.0.0 | |
Cisco Firepower Threat Defense | =6.1.0 | |
Cisco Firepower Threat Defense | =6.2.0 | |
Cisco Firepower Threat Defense | =6.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0297 has been rated as a high severity vulnerability.
To fix CVE-2018-0297, you should upgrade to a patched version of Cisco Firepower Threat Defense.
CVE-2018-0297 affects Cisco Firepower Threat Defense software versions 6.0.0, 6.1.0, 6.2.0, and 6.2.2.
Yes, CVE-2018-0297 can be exploited by unauthenticated remote attackers.
CVE-2018-0297 allows attackers to bypass SSL traffic blocking enforced by Access Control policies.