First published: Wed Oct 27 2021(Updated: )
A vulnerability in the processing of SSH connections for multi-instance deployments of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to a lack of proper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, which causes a DoS condition on the affected device. The device must be manually reloaded to recover. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-rUDseW3r This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2021 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FTD Software Releases | >=6.5.0=6.6.0<=6.7.0<6.7.0.3 (Jan 2022)>=6.3.0<=6.4.0<6.4.0.13 (Nov 2021) | 6.7.0.3 (Jan 2022) 6.4.0.13 (Nov 2021) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ftd-dos-rUDseW3r is rated as high due to potential denial of service conditions.
To fix cisco-sa-ftd-dos-rUDseW3r, you should upgrade to the latest version of Cisco FTD Software that resolves the vulnerability.
Cisco FTD Software versions from 6.3.0 up to but not including 6.7.0.3, and version 6.6.0 are affected by cisco-sa-ftd-dos-rUDseW3r.
Yes, an unauthenticated remote attacker can exploit cisco-sa-ftd-dos-rUDseW3r to induce a denial of service.
The impact of cisco-sa-ftd-dos-rUDseW3r can lead to service disruptions and unavailability of the affected Cisco devices.