First published: Wed Apr 27 2022(Updated: )
A vulnerability in the local malware analysis process of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to insufficient error handling in the local malware analysis process of an affected device. An attacker could exploit this vulnerability by sending a crafted file through the device. A successful exploit could allow the attacker to cause the local malware analysis process to crash, which could result in a DoS condition. Notes: Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-amp-local-dos-CUfwRJXT This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FTD Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco FTD Software vulnerability is cisco-sa-ftd-amp-local-dos-CUfwRJXT.
The title of this vulnerability is Cisco Firepower Threat Defense Software Local Malware Analysis Denial of Service Vulnerability.
The severity rating for this vulnerability is medium with a value of 5.3.
This vulnerability affects Cisco Firepower Threat Defense (FTD) Software.
An unauthenticated, remote attacker can exploit this vulnerability to cause a denial of service (DoS) condition on the affected device.