First published: Wed May 01 2019(Updated: )
A vulnerability in the internal packet-processing functionality of Cisco Firepower Threat Defense (FTD) Software for the Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error, which may prevent ingress buffers from being replenished under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to consume all input buffers, which are shared between all interfaces, leading to a queue wedge condition in all active interfaces. This situation would cause an affected device to stop processing any incoming traffic and result in a DoS condition until the device is reloaded manually. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FTD Software | =6.2.3<6.2.3.12=6.2.2<6.2.3.12>=6.0=6.0.1=6.1.0=6.2.0<=6.2.1<6.2.3.12 | 6.2.3.12 6.2.3.12 6.2.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190501-frpwr-dos is considered critical due to its potential to cause denial of service.
To fix cisco-sa-20190501-frpwr-dos, upgrade your Cisco FTD Software to a version that is not affected, such as versions beyond 6.2.3.12.
The cisco-sa-20190501-frpwr-dos vulnerability affects the Cisco Firepower 2100 Series running specific versions of FTD Software.
Yes, cisco-sa-20190501-frpwr-dos can be exploited by an unauthenticated, remote attacker.
cisco-sa-20190501-frpwr-dos can lead to a complete denial of service, causing the affected device to stop processing traffic.