Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2018-06-07 |
Product | Firepower Threat Defense | Last view | 2024-11-15 |
Version | 6.2.3.1 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:cisco:firepower_threat_defense |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
0 | 2024-11-15 | CVE-2022-20685 | A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. |
6.1 | 2024-10-23 | CVE-2024-20382 | A vulnerability in the VPN web client services feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a browser that is accessing an affected device. This vulnerability is due to improper validation of user-supplied input to application endpoints. An attacker could exploit this vulnerability by persuading a user to follow a link designed to submit malicious input to the affected application. A successful exploit could allow the attacker to execute arbitrary HTML or script code in the browser in the context of the web services page. |
6 | 2024-04-24 | CVE-2024-20359 | A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High. |
8.6 | 2024-04-24 | CVE-2024-20353 | A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads. |
4.3 | 2023-12-12 | CVE-2023-20275 | A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address. This vulnerability is due to improper validation of the packet's inner source IP address after decryption. An attacker could exploit this vulnerability by sending crafted packets through the tunnel. A successful exploit could allow the attacker to send a packet impersonating another VPN user's IP address. It is not possible for the attacker to receive return packets. |
5.3 | 2023-11-01 | CVE-2023-20267 | A vulnerability in the IP geolocation rules of Snort 3 could allow an unauthenticated, remote attacker to potentially bypass IP address restrictions. This vulnerability exists because the configuration for IP geolocation rules is not parsed properly. An attacker could exploit this vulnerability by spoofing an IP address until they bypass the restriction. A successful exploit could allow the attacker to bypass location-based IP address restrictions. |
4.3 | 2023-11-01 | CVE-2023-20247 | A vulnerability in the remote access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to bypass a configured multiple certificate authentication policy and connect using only a valid username and password. This vulnerability is due to improper error handling during remote access VPN authentication. An attacker could exploit this vulnerability by sending crafted requests during remote access VPN session establishment. A successful exploit could allow the attacker to bypass the configured multiple certificate authentication policy while retaining the privileges and permissions associated with the original connection profile. |
5.3 | 2023-11-01 | CVE-2023-20246 | Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system. |
8.6 | 2023-11-01 | CVE-2023-20244 | A vulnerability in the internal packet processing of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Firewalls could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain packets when they are sent to the inspection engine. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to deplete all 9,472 byte blocks on the device, resulting in traffic loss across the device or an unexpected reload of the device. If the device does not reload on its own, a manual reload of the device would be required to recover from this state. |
8.6 | 2023-11-01 | CVE-2023-20095 | A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of HTTPS requests. An attacker could exploit this vulnerability by sending crafted HTTPS requests to an affected system. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a DoS condition. |
8.6 | 2023-11-01 | CVE-2023-20086 | A vulnerability in ICMPv6 processing of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper processing of ICMPv6 messages. An attacker could exploit this vulnerability by sending crafted ICMPv6 messages to a targeted Cisco ASA or FTD system with IPv6 enabled. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. |
8.6 | 2023-11-01 | CVE-2023-20083 | A vulnerability in ICMPv6 inspection when configured with the Snort 2 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the CPU of an affected device to spike to 100 percent, which could stop all traffic processing and result in a denial of service (DoS) condition. FTD management traffic is not affected by this vulnerability. This vulnerability is due to improper error checking when parsing fields within the ICMPv6 header. An attacker could exploit this vulnerability by sending a crafted ICMPv6 packet through an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition. Note: To recover from the DoS condition, the Snort 2 Detection Engine or the Cisco FTD device may need to be restarted. |
5.8 | 2023-11-01 | CVE-2023-20071 | Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and deliver a malicious payload. |
8.2 | 2023-11-01 | CVE-2023-20063 | A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device. |
7.5 | 2023-10-10 | CVE-2023-44487 | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
9.1 | 2023-09-06 | CVE-2023-20269 | A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user. This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following: Identify valid credentials that could then be used to establish an unauthorized remote access VPN session. Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier). Notes: Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured. This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured. Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability. |
7.5 | 2023-03-23 | CVE-2023-20107 | A vulnerability in the deterministic random bit generator (DRBG), also known as pseudorandom number generator (PRNG), in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software for Cisco ASA 5506-X, ASA 5508-X, and ASA 5516-X Firewalls could allow an unauthenticated, remote attacker to cause a cryptographic collision, enabling the attacker to discover the private key of an affected device. This vulnerability is due to insufficient entropy in the DRBG for the affected hardware platforms when generating cryptographic keys. An attacker could exploit this vulnerability by generating a large number of cryptographic keys on an affected device and looking for collisions with target devices. A successful exploit could allow the attacker to impersonate an affected target device or to decrypt traffic secured by an affected key that is sent to or from an affected target device. |
4.9 | 2022-11-15 | CVE-2022-20949 | A vulnerability in the management web server of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with high privileges to execute configuration commands on an affected system. This vulnerability exists because access to HTTPS endpoints is not properly restricted on an affected device. An attacker could exploit this vulnerability by sending specific messages to the affected HTTPS handler. A successful exploit could allow the attacker to perform configuration changes on the affected system, which should be configured and managed only through Cisco Firepower Management Center (FMC) Software. |
7.5 | 2022-11-15 | CVE-2022-20947 | A vulnerability in dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to improper processing of HostScan data received from the Posture (HostScan) module. An attacker could exploit this vulnerability by sending crafted HostScan data to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU"] This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. |
7.5 | 2022-11-15 | CVE-2022-20946 | A vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory handling error that occurs when GRE traffic is processed. An attacker could exploit this vulnerability by sending a crafted GRE payload through an affected device. A successful exploit could allow the attacker to cause the device to restart, resulting in a DoS condition.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM"] This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. |
5.3 | 2022-11-15 | CVE-2022-20940 | A vulnerability in the TLS handler of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability is due to improper implementation of countermeasures against a Bleichenbacher attack on a device that uses SSL decryption policies. An attacker could exploit this vulnerability by sending crafted TLS messages to an affected device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack. A successful exploit could allow the attacker to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions to the affected device. |
6.7 | 2022-11-15 | CVE-2022-20934 | A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as root. This vulnerability is due to improper input validation for specific CLI commands. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials. |
5.8 | 2022-11-15 | CVE-2022-20928 | A vulnerability in the authentication and authorization flows for VPN connections in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to establish a connection as a different user. This vulnerability is due to a flaw in the authorization verifications during the VPN authentication flow. An attacker could exploit this vulnerability by sending a crafted packet during a VPN authentication. The attacker must have valid credentials to establish a VPN connection. A successful exploit could allow the attacker to establish a VPN connection with access privileges from a different user. |
6.5 | 2022-11-15 | CVE-2022-20927 | A vulnerability in the SSL/TLS client of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management when a device initiates SSL/TLS connections. An attacker could exploit this vulnerability by ensuring that the device will connect to an SSL/TLS server that is using specific encryption parameters. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition. |
7.5 | 2022-11-15 | CVE-2022-20854 | A vulnerability in the processing of SSH connections of Cisco Firepower Management Center (FMC) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a reboot on the affected device. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
15% (15) | CWE-20 | Improper Input Validation |
14% (14) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
8% (8) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
7% (7) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
5% (5) | CWE-787 | Out-of-bounds Write |
5% (5) | CWE-770 | Allocation of Resources Without Limits or Throttling |
5% (5) | CWE-755 | Improper Handling of Exceptional Conditions |
5% (5) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
5% (5) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
3% (3) | CWE-203 | Information Exposure Through Discrepancy |
2% (2) | CWE-668 | Exposure of Resource to Wrong Sphere |
2% (2) | CWE-116 | Improper Encoding or Escaping of Output |
1% (1) | CWE-693 | Protection Mechanism Failure |
1% (1) | CWE-667 | Insufficient Locking |
1% (1) | CWE-613 | Insufficient Session Expiration |
1% (1) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
1% (1) | CWE-552 | Files or Directories Accessible to External Parties |
1% (1) | CWE-476 | NULL Pointer Dereference |
1% (1) | CWE-436 | Interpretation Conflict |
1% (1) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
1% (1) | CWE-415 | Double Free |
1% (1) | CWE-404 | Improper Resource Shutdown or Release |
1% (1) | CWE-345 | Insufficient Verification of Data Authenticity |
1% (1) | CWE-332 | Insufficient Entropy in PRNG |
1% (1) | CWE-331 | Insufficient Entropy |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-08 | Cisco ASA/FTD OSPF LLS denial of service attempt RuleID : 56091 - Type : SERVER-OTHER - Revision : 2 |
2020-12-08 | Cisco ASA/FTD OSPF LLS denial of service attempt RuleID : 56090 - Type : SERVER-OTHER - Revision : 1 |
2020-12-08 | Cisco ASA and FTD denial of service attempt RuleID : 56089 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-08 | Cisco ASA and FTD web services large file upload denial of service attempt RuleID : 56087 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco ASA and FTD MGCP denial of service attempt RuleID : 53871 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco ASA and FTD MGCP denial of service attempt RuleID : 53870 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco ASA and FTD MGCP denial of service attempt RuleID : 53869 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco ASA and FTD MGCP denial of service attempt RuleID : 53868 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco ASA and FTD IPv6 DNS request stack buffer overflow attempt RuleID : 53867 - Type : PROTOCOL-DNS - Revision : 1 |
2020-12-05 | Cisco ASA and FTD directory traversal attempt RuleID : 53851 - Type : SERVER-WEBAPP - Revision : 2 |
2020-12-05 | Cisco ASA and FTD memory disclosure attempt RuleID : 53850 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco ASA and FTD malformed OSPF denial of service attempt RuleID : 53847 - Type : PROTOCOL-OTHER - Revision : 1 |
2019-01-15 | SIP over SCTP wildcard VIA address attempt RuleID : 48593 - Type : PROTOCOL-VOIP - Revision : 1 |
2018-12-04 | SIP wildcard VIA address flood attempt RuleID : 48265 - Type : PROTOCOL-VOIP - Revision : 2 |
2018-12-04 | SIP wildcard VIA address flood attempt RuleID : 48264 - Type : PROTOCOL-VOIP - Revision : 2 |
2020-12-05 | Cisco Adaptive Security Appliance directory traversal attempt RuleID : 46897 - Type : SERVER-WEBAPP - Revision : 1 |
2014-01-10 | SIP REGISTER flood attempt RuleID : 20395 - Type : PROTOCOL-VOIP - Revision : 5 |
2014-01-10 | SSH brute force login attempt RuleID : 19559 - Type : INDICATOR-SCAN - Revision : 13 |
2014-01-10 | SIP REGISTER flood attempt RuleID : 19389 - Type : PROTOCOL-VOIP - Revision : 9 |
2014-01-10 | HTTP request with negative Content-Length attempt RuleID : 16195 - Type : SERVER-WEBAPP - Revision : 17 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-11-08 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20181031-asaftd-sip-dos-asa.nasl - Type: ACT_GATHER_INFO |
2018-11-08 | Name: The packet inspection software installed on the remote host is affected by a ... File: cisco-sa-20181031-asaftd-sip-dos-ftd.nasl - Type: ACT_GATHER_INFO |
2018-10-04 | Name: The remote device is missing a vendor-supplied security patches. File: cisco-sa-20181003-ftd-inspect-dos.nasl - Type: ACT_GATHER_INFO |
2018-06-25 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180606-asa.nasl - Type: ACT_GATHER_INFO |