First published: Wed May 01 2019(Updated: )
A vulnerability in the TCP ingress handler for the data interfaces that are configured with management access to Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an increase in CPU and memory usage, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient ingress TCP rate limiting for TCP ports 22 (SSH) and 443 (HTTPS). An attacker could exploit this vulnerability by sending a crafted, steady stream of TCP traffic to port 22 or 443 on the data interfaces that are configured with management access to the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-firepower-dos
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FTD Software | =6.2.3<6.2.3.12=6.2.2<6.2.3.12=6.2.1<6.2.3.12=6.2.0<6.2.3.12=6.1.0<6.2.3.12=6.0.1<6.2.3.12=6.0<6.2.3.12 | 6.2.3.12 6.2.3.12 6.2.3.12 6.2.3.12 6.2.3.12 6.2.3.12 6.2.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-20190501-firepower-dos vulnerability is rated as high severity due to its potential for denial of service.
To fix cisco-sa-20190501-firepower-dos, you should upgrade your Cisco FTD Software to a fixed version as specified by Cisco.
The cisco-sa-20190501-firepower-dos vulnerability affects various versions of Cisco FTD Software from 6.0 to 6.2.3.
Yes, cisco-sa-20190501-firepower-dos can be exploited by an unauthenticated, remote attacker.
Exploitation of cisco-sa-20190501-firepower-dos can lead to increased CPU and memory usage, resulting in a denial of service.