Executive Summary

Title Cisco Firepower Detection Engine SSL Decryption Memory Consumption Denial of Service Vulnerability
Name cisco-sa-20171004-ftd First vendor Publication 2017-10-04
Vendor Cisco Last vendor Modification 2017-10-04
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


A vulnerability in SSL traffic decryption for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause depletion of system memory. If this memory leak persists over time, a denial of service (DoS) condition could develop because traffic can cease to be forwarded through the device.

The vulnerability is due to an error in how the Firepower Detection Snort Engine handles SSL traffic decryption and notifications to and from the Adaptive Security Appliance (ASA) handler. An attacker could exploit this vulnerability by sending a steady stream of malicious Secure Sockets Layer (SSL) traffic through the device. An exploit could allow the attacker to cause a DoS condition when the device runs low on system memory.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd"]


iQKBBAEBAgBrBQJZ1QWNZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHknFQ/6A6oiOETh62QlFM0z GKecCEO46VvfNkiW3C7O/gGtSTVz6uwdiTyJKSAO1NWvxrFKihxL9lZxKRwXxbFf +LPXfz6lFEN1FIMYWubG3U5LEIH+dzg7883Oa809g4se3cnufQ3R76CleGJixrTi qJAHDIgOXBH2hV1gOkBFgPkrz4CVBXV08bZi4g0zxxDs2mkHjIZhEBOwQjl8yuAu 067n4oqGSLf/jwIAWJKdZkcfIfEWpXZsAbaYoiSrvmQV3pWLGyH3ETxVxnfIPzM5 drwJuW4bSeR60c1iOC4ncwLmfqVgTpm4aOg33aZoqcNa0Ec0F+ot7LreZpJlxUH/ R1h9QscgyEqyDhuPU4y4LHrDJlxAKeogDuWaIrCb/FC4YO+zA+k8c5gKqj6hpzQP DFuQ3n+SPmsEKKmyRMeE6IYZDWa9uiluahkgzVHlAFDo3lgP/UX6y1yDAIJdiVg2 34EmePTwBnG0wCpr32GFDDM++o7KfKflJ0oHgZHAq9quDL7tXh5qzhjGZiz28a/a z7gPoOCl9dwSQIXlaoJflpGeUvDmBmjDIAmDzVgbdwFOajWIJWBr3qBD/ltdoYm8 3/7TfocNLXp2gxr3LVbRjQf838bohaJc4TUT9gmIm7ZlBqxkiaW86nGJZt0QSNKt d1C/oqCMS4z57We2MHP7HHJjkNs= =pXFu END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-772 Missing Release of Resource after Effective Lifetime

CPE : Common Platform Enumeration

Application 9

Nessus® Vulnerability Scanner

Date Description
2017-10-12 Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20171004-ftd-firepower_threat_defense.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2017-10-20 21:25:38
  • Multiple Updates
2017-10-13 13:25:48
  • Multiple Updates
2017-10-05 13:26:50
  • Multiple Updates
2017-10-04 21:22:31
  • First insertion