First published: Thu Feb 21 2019(Updated: )
A vulnerability in field-programmable gate array (FPGA) ingress buffer management for the Cisco Firepower 9000 Series with the Cisco Firepower 2-port 100G double-width network module (PID: FPR9K-DNM-2X100G) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. Manual intervention may be required before a device will resume normal operations. The vulnerability is due to a logic error in the FPGA related to the processing of different types of input packets. An attacker could exploit this vulnerability by being on the adjacent subnet and sending a crafted sequence of input packets to a specific interface on an affected device. A successful exploit could allow the attacker to cause a queue wedge condition on the interface. When a wedge occurs, the affected device will stop processing any additional packets that are received on the wedged interface. Version 2.2 is affected.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower 9000 Firmware | =2.2\(200.8\) | |
Cisco Firepower 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-1700.
The severity level of CVE-2019-1700 is medium.
CVE-2019-1700 could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition in Cisco Firepower 9000 Series.
Yes, Cisco Firepower 9000 firmware version 2.2 (200.8) is affected by CVE-2019-1700.
To fix CVE-2019-1700, apply the necessary updates and patches provided by Cisco.