First published: Fri May 03 2019(Updated: )
A vulnerability in the TCP ingress handler for the data interfaces that are configured with management access to Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an increase in CPU and memory usage, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient ingress TCP rate limiting for TCP ports 22 (SSH) and 443 (HTTPS). An attacker could exploit this vulnerability by sending a crafted, steady stream of TCP traffic to port 22 or 443 on the data interfaces that are configured with management access to the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | <6.2.3.12 | |
Cisco Firepower Threat Defense | >=6.3.0<6.3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15462 is rated as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2018-15462, update Cisco Firepower Threat Defense to a version that is not vulnerable, specifically beyond 6.2.3.12 and 6.3.0.3.
CVE-2018-15462 affects users of Cisco Firepower Threat Defense versions up to, but not including, 6.2.3.12 and those in the range of 6.3.0 to 6.3.0.3.
CVE-2018-15462 can be exploited by unauthenticated remote attackers to increase CPU and memory usage.
The potential impact of CVE-2018-15462 includes degraded performance and denial of service for affected Cisco Firepower Threat Defense devices.