First published: Wed Nov 01 2023(Updated: )
A vulnerability in the internal packet processing of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Firewalls could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain packets when they are sent to the inspection engine. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to deplete all 9,472 byte blocks on the device, resulting in traffic loss across the device or an unexpected reload of the device. If the device does not reload on its own, a manual reload of the device would be required to recover from this state.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Cisco Secure Firewall Threat Defense | =6.2.3 | |
Cisco Secure Firewall Threat Defense | =6.2.3.1 | |
Cisco Secure Firewall Threat Defense | =6.2.3.2 | |
Cisco Secure Firewall Threat Defense | =6.2.3.3 | |
Cisco Secure Firewall Threat Defense | =6.2.3.4 | |
Cisco Secure Firewall Threat Defense | =6.2.3.5 | |
Cisco Secure Firewall Threat Defense | =6.2.3.6 | |
Cisco Secure Firewall Threat Defense | =6.2.3.7 | |
Cisco Secure Firewall Threat Defense | =6.2.3.8 | |
Cisco Secure Firewall Threat Defense | =6.2.3.9 | |
Cisco Secure Firewall Threat Defense | =6.2.3.10 | |
Cisco Secure Firewall Threat Defense | =6.2.3.11 | |
Cisco Secure Firewall Threat Defense | =6.2.3.12 | |
Cisco Secure Firewall Threat Defense | =6.2.3.13 | |
Cisco Secure Firewall Threat Defense | =6.2.3.14 | |
Cisco Secure Firewall Threat Defense | =6.2.3.15 | |
Cisco Secure Firewall Threat Defense | =6.2.3.16 | |
Cisco Secure Firewall Threat Defense | =6.2.3.17 | |
Cisco Secure Firewall Threat Defense | =6.2.3.18 | |
Cisco Secure Firewall Threat Defense | =6.4.0 | |
Cisco Secure Firewall Threat Defense | =6.4.0.1 | |
Cisco Secure Firewall Threat Defense | =6.4.0.2 | |
Cisco Secure Firewall Threat Defense | =6.4.0.3 | |
Cisco Secure Firewall Threat Defense | =6.4.0.4 | |
Cisco Secure Firewall Threat Defense | =6.4.0.5 | |
Cisco Secure Firewall Threat Defense | =6.4.0.6 | |
Cisco Secure Firewall Threat Defense | =6.4.0.7 | |
Cisco Secure Firewall Threat Defense | =6.4.0.8 | |
Cisco Secure Firewall Threat Defense | =6.4.0.9 | |
Cisco Secure Firewall Threat Defense | =6.4.0.10 | |
Cisco Secure Firewall Threat Defense | =6.4.0.11 | |
Cisco Secure Firewall Threat Defense | =6.4.0.12 | |
Cisco Secure Firewall Threat Defense | =6.4.0.13 | |
Cisco Secure Firewall Threat Defense | =6.4.0.14 | |
Cisco Secure Firewall Threat Defense | =6.4.0.15 | |
Cisco Secure Firewall Threat Defense | =6.4.0.16 | |
Cisco Secure Firewall Threat Defense | =6.6.0 | |
Cisco Secure Firewall Threat Defense | =6.6.0.1 | |
Cisco Secure Firewall Threat Defense | =6.6.1 | |
Cisco Secure Firewall Threat Defense | =6.6.3 | |
Cisco Secure Firewall Threat Defense | =6.6.4 | |
Cisco Secure Firewall Threat Defense | =6.6.5 | |
Cisco Secure Firewall Threat Defense | =6.6.5.1 | |
Cisco Secure Firewall Threat Defense | =6.6.5.2 | |
Cisco Secure Firewall Threat Defense | =6.6.7 | |
Cisco Secure Firewall Threat Defense | =6.6.7.1 | |
Cisco Secure Firewall Threat Defense | =6.7.0 | |
Cisco Secure Firewall Threat Defense | =6.7.0.1 | |
Cisco Secure Firewall Threat Defense | =6.7.0.2 | |
Cisco Secure Firewall Threat Defense | =6.7.0.3 | |
Cisco Secure Firewall Threat Defense | =7.0.0 | |
Cisco Secure Firewall Threat Defense | =7.0.0.1 | |
Cisco Secure Firewall Threat Defense | =7.0.1 | |
Cisco Secure Firewall Threat Defense | =7.0.1.1 | |
Cisco Secure Firewall Threat Defense | =7.0.2 | |
Cisco Secure Firewall Threat Defense | =7.0.2.1 | |
Cisco Secure Firewall Threat Defense | =7.0.3 | |
Cisco Secure Firewall Threat Defense | =7.0.4 | |
Cisco Secure Firewall Threat Defense | =7.0.5 | |
Cisco Secure Firewall Threat Defense | =7.1.0 | |
Cisco Secure Firewall Threat Defense | =7.1.0.1 | |
Cisco Secure Firewall Threat Defense | =7.1.0.3 | |
Cisco Secure Firewall Threat Defense | =7.2.0 | |
Cisco Secure Firewall Threat Defense | =7.2.0.1 | |
Cisco Secure Firewall Threat Defense | =7.2.1 | |
Cisco Secure Firewall Threat Defense | =7.2.2 | |
Cisco Secure Firewall Threat Defense | =7.2.3 | |
Cisco Secure Firewall Threat Defense | =7.3.0 | |
Cisco Secure Firewall Threat Defense | =7.3.1 | |
Cisco Secure Firewall Threat Defense | =7.3.1.1 | |
Any of | ||
Cisco Firepower 2110 | ||
Cisco Firepower 2120 | ||
Cisco Firepower 2130 | ||
Cisco Firepower 2140 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20244 is classified as critical due to its potential to allow for denial of service conditions on affected Cisco Firepower devices.
To fix CVE-2023-20244, it is recommended to apply the latest security updates from Cisco for any affected Firepower Threat Defense software versions.
CVE-2023-20244 affects Cisco Firepower 2100 Series Firewalls running specific versions of Firepower Threat Defense software.
No, CVE-2023-20244 can be exploited by unauthenticated remote attackers.
Affected versions for CVE-2023-20244 include Firepower Threat Defense versions 6.2.x, 6.4.x, 6.6.x, 6.7.x, and various versions up to 7.3.1.1.