First published: Wed Nov 01 2023(Updated: )
A vulnerability in the SSL file policy implementation of Cisco Firepower Threat Defense (FTD) Software that occurs when the SSL/TLS connection is configured with a URL Category and the Snort 3 detection engine could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to unexpectedly restart. This vulnerability exists because a logic error occurs when a Snort 3 detection engine inspects an SSL/TLS connection that has either a URL Category configured on the SSL file policy or a URL Category configured on an access control policy with TLS server identity discovery enabled. Under specific, time-based constraints, an attacker could exploit this vulnerability by sending a crafted SSL/TLS connection through an affected device. A successful exploit could allow the attacker to trigger an unexpected reload of the Snort 3 detection engine, resulting in either a bypass or denial of service (DoS) condition, depending on device configuration. The Snort 3 detection engine will restart automatically. No manual intervention is required.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | =7.0.0 | |
Cisco Firepower Threat Defense | =7.0.0.1 | |
Cisco Firepower Threat Defense | =7.0.1 | |
Cisco Firepower Threat Defense | =7.0.1.1 | |
Cisco Firepower Threat Defense | =7.0.2 | |
Cisco Firepower Threat Defense | =7.0.2.1 | |
Cisco Firepower Threat Defense | =7.0.3 | |
Cisco Firepower Threat Defense | =7.0.4 | |
Cisco Firepower Threat Defense | =7.0.5 | |
Cisco Firepower Threat Defense | =7.1.0 | |
Cisco Firepower Threat Defense | =7.1.0.1 | |
Cisco Firepower Threat Defense | =7.1.0.2 | |
Cisco Firepower Threat Defense | =7.1.0.3 | |
Cisco Firepower Threat Defense | =7.2.0 | |
Cisco Firepower Threat Defense | =7.2.0.1 | |
Cisco Firepower Threat Defense | =7.2.1 | |
Cisco Firepower Threat Defense | =7.2.2 | |
Cisco Firepower Threat Defense | =7.2.3 | |
Cisco Firepower Threat Defense | =7.3.0 | |
Cisco Firepower Threat Defense | =7.3.1 | |
Cisco Firepower Threat Defense | =7.3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-20177.
The affected software is Cisco Firepower Threat Defense version 7.0.0 to 7.3.1.1.
The severity of CVE-2023-20177 is medium with a CVSS score of 4.
An unauthenticated, remote attacker can exploit this vulnerability by causing the Snort 3 detection engine to utilize excessive memory when processing a malicious URL.
Yes, Cisco has released software updates to address this vulnerability. Please refer to the reference link for more information.