First published: Wed Nov 01 2023(Updated: )
A vulnerability in ICMPv6 inspection when configured with the Snort 2 detection engine for Cisco Firepower Threat Defense (FTD) Software or Cisco FirePOWER Services could allow an unauthenticated, remote attacker to cause the CPU of an affected device to spike to 100 percent, which could stop
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software | ||
Cisco ASA FirePOWER |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ftd-icmpv6-dos-4eMkLuN is categorized as high, due to the potential for remote denial of service.
To fix cisco-sa-ftd-icmpv6-dos-4eMkLuN, you should apply the latest firmware updates provided by Cisco for affected Firepower Threat Defense Software and FirePOWER Services.
The affected products include Cisco Firepower Threat Defense Software and Cisco FirePOWER Services.
Yes, cisco-sa-ftd-icmpv6-dos-4eMkLuN can be exploited remotely by unauthenticated attackers.
The impact of cisco-sa-ftd-icmpv6-dos-4eMkLuN is a CPU spike to 100 percent, potentially leading to device unresponsiveness.