First published: Wed May 06 2020(Updated: )
A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU
Credit: This vulnerability was found by Santosh Krishnamurthy Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FTD Software | >=Earlier than 6.1.0=6.1.0=6.2.0=6.2.1=6.2.2=6.2.3=6.3.0=6.4.0<=6.5.0<6.5.0.5 (future release)Cisco_FTD_Hotfix_H-6.5.0.5-2.sh.REL.tar and laterCisco_FTD_SSP_FP1K_Hotfix_H-6.5.0.5-2.sh.REL.tar and laterCisco_FTD_SSP_FP2K_Hotfix_H-6.5.0.5-2.sh.REL.tar and laterCisco_FTD_SSP_Hotfix_H-6.5.0.5-2.sh.REL.tar and later | 6.5.0.5 (future release)Cisco_FTD_Hotfix_H-6.5.0.5-2.sh.REL.tar and laterCisco_FTD_SSP_FP1K_Hotfix_H-6.5.0.5-2.sh.REL.tar and laterCisco_FTD_SSP_FP2K_Hotfix_H-6.5.0.5-2.sh.REL.tar and laterCisco_FTD_SSP_Hotfix_H-6.5.0.5-2.sh.REL.tar and later |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.