CVE-2018-0254 (GCVE-0-2018-0254)
Vulnerability from cvelistv5 – Published: 2018-04-19 20:00 – Updated: 2024-11-29 15:16
VLAI?
Summary
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass configured file action policies if an Intelligent Application Bypass (IAB) with a drop percentage threshold is also configured. The vulnerability is due to incorrect counting of the percentage of dropped traffic. An attacker could exploit this vulnerability by sending network traffic to a targeted device. An exploit could allow the attacker to bypass configured file action policies, and traffic that should be dropped could be allowed into the network. Cisco Bug IDs: CSCvf86435.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Cisco Firepower System Software |
Affected:
Cisco Firepower System Software
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:21:14.430Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2"
},
{
"name": "103940",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/103940"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2018-0254",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-29T14:44:20.614528Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-29T15:16:11.647Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Firepower System Software",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Cisco Firepower System Software"
}
]
}
],
"datePublic": "2018-04-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass configured file action policies if an Intelligent Application Bypass (IAB) with a drop percentage threshold is also configured. The vulnerability is due to incorrect counting of the percentage of dropped traffic. An attacker could exploit this vulnerability by sending network traffic to a targeted device. An exploit could allow the attacker to bypass configured file action policies, and traffic that should be dropped could be allowed into the network. Cisco Bug IDs: CSCvf86435."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-693",
"description": "CWE-693",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-24T09:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2"
},
{
"name": "103940",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/103940"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2018-0254",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Firepower System Software",
"version": {
"version_data": [
{
"version_value": "Cisco Firepower System Software"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass configured file action policies if an Intelligent Application Bypass (IAB) with a drop percentage threshold is also configured. The vulnerability is due to incorrect counting of the percentage of dropped traffic. An attacker could exploit this vulnerability by sending network traffic to a targeted device. An exploit could allow the attacker to bypass configured file action policies, and traffic that should be dropped could be allowed into the network. Cisco Bug IDs: CSCvf86435."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-693"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2"
},
{
"name": "103940",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103940"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2018-0254",
"datePublished": "2018-04-19T20:00:00",
"dateReserved": "2017-11-27T00:00:00",
"dateUpdated": "2024-11-29T15:16:11.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C6F9B4F-2837-4034-B45C-C131303FF06B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01C9D2DC-17CE-499D-ACF3-BBA75E7AEEE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD48BE40-C647-429A-81B6-59E125BBE415\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42496A5B-1644-4088-BBCF-2ED810A5694B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:amp_7150:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F299F4A-CA8C-46EA-A86F-CA52C182DAE6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:amp_8150:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B6B5352-91B4-4568-A43D-48A534904AAE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_7010:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBED4712-39D6-4DFD-B8A5-AF20027DD97E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_7020:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF7D9A02-6ED1-4118-9950-8D5537B1DDCA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_7030:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"497E5799-968E-438E-ADE9-205E947A33A9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_7050:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52AA3762-FFDD-4376-8D79-B393CBFAE23A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_7110:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CFB0F77-2A56-439D-87AC-18ED59413F4F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_7115:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D30DB8A4-83D5-4DA4-8F78-0A7109406E61\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_7120:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"483066C8-ED60-456D-B2BE-110524DDE1AA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_7125:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FBD966A-B931-475A-924C-C1557B6CE7DB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_8120:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52DD84FD-BC19-4E94-BBDC-176A38CA95B8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_8130:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA4BA4BB-C7AA-4D60-BCCF-733988E954D7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_8140:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B47B208A-6219-4037-8D9E-1B49C0E70BA7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_8250:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"149B56F8-C51B-4215-A649-9408FD27413D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_8260:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB97E4A5-2373-49F3-8A8B-005BAC9BEC32\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_8270:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31B22719-10C9-4FF4-A330-68F0F870FD4E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_8290:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F78A7356-59B9-4A8D-BBDB-6A70DDA5A183\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_8350:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7FC1382-F102-4946-A5E5-467D40953637\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_8360:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F58D55B-E671-44E4-841F-72F95D20C4A7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_8370:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A1A5F5A-51F7-4F5D-8901-FA0200602F77\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_appliance_8390:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2AE0775-6C5E-4360-977C-57D9DDD4C9B7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_management_center_1000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44C4E004-BCBA-4C2A-BBC7-8C6F9E54CC15\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_management_center_2000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A389E5A4-0994-4F75-A264-18371D726ACA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_management_center_2500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E36B8162-AF24-4538-B81E-6FB95AC221C8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_management_center_4000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A9FD1A9-1BB3-4FFB-AB75-5BF8AF61FF1D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firepower_management_center_4500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05426855-230D-45AA-BD24-DEBBB924C43E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firesight_management_center_1500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"756594F4-D397-425F-ACA3-2E130729B736\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firesight_management_center_3500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B96B6255-BEE7-4AF7-BC82-74CDCBE2BEA1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:firesight_management_center_750:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DE96D31-BB8C-46F0-98F2-903F794C19D9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ngips_virtual_appliance:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34B16156-73F5-4172-ABB1-8BA2F950ABE9\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass configured file action policies if an Intelligent Application Bypass (IAB) with a drop percentage threshold is also configured. The vulnerability is due to incorrect counting of the percentage of dropped traffic. An attacker could exploit this vulnerability by sending network traffic to a targeted device. An exploit could allow the attacker to bypass configured file action policies, and traffic that should be dropped could be allowed into the network. Cisco Bug IDs: CSCvf86435.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en el motor de detecci\\u00f3n de Cisco Firepower System Software podr\\u00eda permitir que un atacante remoto sin autenticar omita pol\\u00edticas de acci\\u00f3n de archivos configuradas si un IAB (Intelligent Application Bypass) con un l\\u00edmite de porcentaje de anulaci\\u00f3n est\\u00e1 tambi\\u00e9n configurado Esta vulnerabilidad se debe al conteo incorrecto del porcentaje de tr\\u00e1fico anulado. Un atacante podr\\u00eda explotar esta vulnerabilidad enviando tr\\u00e1fico de red a un dispositivo afectado. Su explotaci\\u00f3n podr\\u00eda permitir que el atacante omita pol\\u00edticas de acci\\u00f3n de archivos configuradas; el tr\\u00e1fico que deber\\u00eda omitirse podr\\u00eda pasar a la red. Cisco Bug IDs: CSCvf86435.\"}]",
"id": "CVE-2018-0254",
"lastModified": "2024-11-21T03:37:49.460",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": true, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-04-19T20:29:01.127",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/103940\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/103940\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-693\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-693\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-0254\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2018-04-19T20:29:01.127\",\"lastModified\":\"2024-11-21T03:37:49.460\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass configured file action policies if an Intelligent Application Bypass (IAB) with a drop percentage threshold is also configured. The vulnerability is due to incorrect counting of the percentage of dropped traffic. An attacker could exploit this vulnerability by sending network traffic to a targeted device. An exploit could allow the attacker to bypass configured file action policies, and traffic that should be dropped could be allowed into the network. Cisco Bug IDs: CSCvf86435.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el motor de detecci\u00f3n de Cisco Firepower System Software podr\u00eda permitir que un atacante remoto sin autenticar omita pol\u00edticas de acci\u00f3n de archivos configuradas si un IAB (Intelligent Application Bypass) con un l\u00edmite de porcentaje de anulaci\u00f3n est\u00e1 tambi\u00e9n configurado Esta vulnerabilidad se debe al conteo incorrecto del porcentaje de tr\u00e1fico anulado. Un atacante podr\u00eda explotar esta vulnerabilidad enviando tr\u00e1fico de red a un dispositivo afectado. Su explotaci\u00f3n podr\u00eda permitir que el atacante omita pol\u00edticas de acci\u00f3n de archivos configuradas; el tr\u00e1fico que deber\u00eda omitirse podr\u00eda pasar a la red. Cisco Bug IDs: CSCvf86435.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-693\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-693\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6F9B4F-2837-4034-B45C-C131303FF06B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01C9D2DC-17CE-499D-ACF3-BBA75E7AEEE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD48BE40-C647-429A-81B6-59E125BBE415\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42496A5B-1644-4088-BBCF-2ED810A5694B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:amp_7150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F299F4A-CA8C-46EA-A86F-CA52C182DAE6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:amp_8150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B6B5352-91B4-4568-A43D-48A534904AAE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_7010:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBED4712-39D6-4DFD-B8A5-AF20027DD97E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_7020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF7D9A02-6ED1-4118-9950-8D5537B1DDCA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_7030:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"497E5799-968E-438E-ADE9-205E947A33A9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_7050:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52AA3762-FFDD-4376-8D79-B393CBFAE23A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_7110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CFB0F77-2A56-439D-87AC-18ED59413F4F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_7115:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D30DB8A4-83D5-4DA4-8F78-0A7109406E61\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_7120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"483066C8-ED60-456D-B2BE-110524DDE1AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_7125:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FBD966A-B931-475A-924C-C1557B6CE7DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_8120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52DD84FD-BC19-4E94-BBDC-176A38CA95B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_8130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4BA4BB-C7AA-4D60-BCCF-733988E954D7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_8140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B47B208A-6219-4037-8D9E-1B49C0E70BA7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_8250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"149B56F8-C51B-4215-A649-9408FD27413D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_8260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB97E4A5-2373-49F3-8A8B-005BAC9BEC32\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_8270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B22719-10C9-4FF4-A330-68F0F870FD4E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_8290:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F78A7356-59B9-4A8D-BBDB-6A70DDA5A183\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_8350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7FC1382-F102-4946-A5E5-467D40953637\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_8360:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F58D55B-E671-44E4-841F-72F95D20C4A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_8370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A1A5F5A-51F7-4F5D-8901-FA0200602F77\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_appliance_8390:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2AE0775-6C5E-4360-977C-57D9DDD4C9B7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_management_center_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44C4E004-BCBA-4C2A-BBC7-8C6F9E54CC15\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_management_center_2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A389E5A4-0994-4F75-A264-18371D726ACA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_management_center_2500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36B8162-AF24-4538-B81E-6FB95AC221C8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_management_center_4000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A9FD1A9-1BB3-4FFB-AB75-5BF8AF61FF1D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_management_center_4500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05426855-230D-45AA-BD24-DEBBB924C43E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firesight_management_center_1500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"756594F4-D397-425F-ACA3-2E130729B736\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firesight_management_center_3500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B96B6255-BEE7-4AF7-BC82-74CDCBE2BEA1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firesight_management_center_750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DE96D31-BB8C-46F0-98F2-903F794C19D9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ngips_virtual_appliance:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34B16156-73F5-4172-ABB1-8BA2F950ABE9\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/103940\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/103940\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/103940\", \"name\": \"103940\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T03:21:14.430Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2018-0254\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-29T14:44:20.614528Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-29T14:45:15.921Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Cisco Firepower System Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"Cisco Firepower System Software\"}]}], \"datePublic\": \"2018-04-19T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/103940\", \"name\": \"103940\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass configured file action policies if an Intelligent Application Bypass (IAB) with a drop percentage threshold is also configured. The vulnerability is due to incorrect counting of the percentage of dropped traffic. An attacker could exploit this vulnerability by sending network traffic to a targeted device. An exploit could allow the attacker to bypass configured file action policies, and traffic that should be dropped could be allowed into the network. Cisco Bug IDs: CSCvf86435.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-693\", \"description\": \"CWE-693\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2018-04-24T09:57:01\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Cisco Firepower System Software\"}]}, \"product_name\": \"Cisco Firepower System Software\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2\", \"name\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securityfocus.com/bid/103940\", \"name\": \"103940\", \"refsource\": \"BID\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass configured file action policies if an Intelligent Application Bypass (IAB) with a drop percentage threshold is also configured. The vulnerability is due to incorrect counting of the percentage of dropped traffic. An attacker could exploit this vulnerability by sending network traffic to a targeted device. An exploit could allow the attacker to bypass configured file action policies, and traffic that should be dropped could be allowed into the network. Cisco Bug IDs: CSCvf86435.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-693\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2018-0254\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"psirt@cisco.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2018-0254\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-29T15:16:11.647Z\", \"dateReserved\": \"2017-11-27T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2018-04-19T20:00:00\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…