CVE-2020-3188 (GCVE-0-2020-3188)
Vulnerability from cvelistv5 – Published: 2020-05-06 16:41 – Updated: 2024-11-15 17:25
VLAI?
Summary
A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only.
Severity ?
5.3 (Medium)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Firepower Threat Defense Software |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:24:00.646Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20200506 Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3188",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-15T16:21:44.521244Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T17:25:40.691Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Firepower Threat Defense Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-05-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-399",
"description": "CWE-399",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-05-06T16:41:06",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20200506 Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU"
}
],
"source": {
"advisory": "cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU",
"defect": [
[
"CSCvo31790"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-05-06T16:00:00-0700",
"ID": "CVE-2020-3188",
"STATE": "PUBLIC",
"TITLE": "Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Firepower Threat Defense Software",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "5.3",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-399"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200506 Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU"
}
]
},
"source": {
"advisory": "cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU",
"defect": [
[
"CSCvo31790"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3188",
"datePublished": "2020-05-06T16:41:06.457420Z",
"dateReserved": "2019-12-12T00:00:00",
"dateUpdated": "2024-11-15T17:25:40.691Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.4.0\", \"versionEndExcluding\": \"6.4.0.9\", \"matchCriteriaId\": \"06741056-2BFD-4F88-917A-F581F813B69E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.5.0\", \"versionEndExcluding\": \"6.5.0.5\", \"matchCriteriaId\": \"3ED0E59C-146C-494F-AD46-F6FB43F9C575\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5505_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D20B7556-CB33-4E96-8B4A-4E70C350079D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5505_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51DFD14D-033B-4AA3-B7C6-E5CE9EEF69DD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5510_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DC4AD47-1789-494E-949F-483CBC2EDF4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5510_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A9AF36E-F7F0-4A0E-B95D-2DF5584D5072\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B091B9BA-D4CA-435B-8D66-602B45F0E0BD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5512-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39AC2543-8397-4CAD-A87C-10AD2F5672A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5512-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70CC1F85-2E5C-4939-9879-417484C58F5A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08F0F160-DAD2-48D4-B7B2-4818B2526F35\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5515-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"715FA7AF-438C-4B73-B411-F5242D82E6DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5515-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"028C5F69-DBAB-42DA-A759-555FACE4CF08\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"977D597B-F6DE-4438-AB02-06BE64D71EBE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5520_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C833630-408A-4491-88E3-F8F50BC0988E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5520_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD20CA7A-9EF1-4BA5-883E-EB9791AB1982\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B387F62-6341-434D-903F-9B72E7F84ECB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5525-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"400F4C4E-75A0-420C-A3D0-35EBCA9439C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5525-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76F77E11-71F3-4197-871F-FEA1E53D7CFB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB71EB29-0115-4307-A9F7-262394FD9FB0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5540_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28EE51A4-C914-4B9C-B483-A56E0AAA788F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5540_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33A3EB45-FDC6-4BAB-9E6D-96A463C1A9B3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17C5A524-E1D9-480F-B655-0680AA5BF720\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5545-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA31C6C9-EC1F-4548-AF39-FD49DD98BBBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5545-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AA06D7D-A0BA-4B17-9EF3-165A203F8921\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57179F60-E330-4FF0-9664-B1E4637FF210\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5550_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C6DCED6-241A-4FB6-B2A4-B4E4DD3B7547\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5550_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"414DE2B9-AE0A-4DE4-9D0A-8C1E11AF85D3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6287D95-F564-44B7-A0F9-91396D7C2C4E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5555-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"611D736A-1C49-4FF7-BC6B-01D735771450\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5555-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E584FE6-A477-4EFE-B562-35FC65229F26\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5535C936-391B-4619-AA03-B35265FC15D7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5580_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2CBAFBF-8727-43F3-9C9E-E3CCCF93BE29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5580_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B400A5F1-2DDA-4881-AB68-3F59262C981D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1E828B8-5ECC-4A09-B2AD-DEDC558713DE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5585-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE020E81-C231-4975-9695-ECE383C32B2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asa_5585-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8D5DAF8-D27D-41A7-9912-580D657557E0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16AE20C2-C77E-4E04-BF13-A48696E52426\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en como el Cisco Firepower Threat Defense (FTD) Software maneja los tiempos de espera de sesi\\u00f3n para las conexiones de administraci\\u00f3n, podr\\u00eda permitir a un atacante remoto no autenticado causar una acumulaci\\u00f3n de conexiones de administraci\\u00f3n remota en un dispositivo afectado, lo que podr\\u00eda resultar en una condici\\u00f3n de denegaci\\u00f3n de servicio (DoS). La vulnerabilidad se presenta porque el per\\u00edodo de tiempo de espera de la sesi\\u00f3n predeterminada para conexiones de administraci\\u00f3n remota espec\\u00edficas es demasiado largo. Un atacante podr\\u00eda explotar esta vulnerabilidad mediante el env\\u00edo de un n\\u00famero grande y sostenido de conexiones de administraci\\u00f3n remota dise\\u00f1adas sobre un dispositivo afectado, resultando en una acumulaci\\u00f3n de esas conexiones sobre el tiempo. Una explotaci\\u00f3n con \\u00e9xito podr\\u00eda permitir a un atacante causar que la interfaz de administraci\\u00f3n remota o el Cisco Firepower Device Manager (FDM) dejen de responder y cause que otras funciones de administraci\\u00f3n se desconecten, resultando en una condici\\u00f3n DoS. El tr\\u00e1fico del usuario que fluye a trav\\u00e9s del dispositivo no estar\\u00eda afectado, y la condici\\u00f3n DoS estar\\u00eda aislada para la administraci\\u00f3n remota solamente.\"}]",
"id": "CVE-2020-3188",
"lastModified": "2024-11-21T05:30:30.560",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}], \"cvssMetricV30\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-05-06T17:15:12.150",
"references": "[{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-613\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-3188\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2020-05-06T17:15:12.150\",\"lastModified\":\"2024-11-21T05:30:30.560\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en como el Cisco Firepower Threat Defense (FTD) Software maneja los tiempos de espera de sesi\u00f3n para las conexiones de administraci\u00f3n, podr\u00eda permitir a un atacante remoto no autenticado causar una acumulaci\u00f3n de conexiones de administraci\u00f3n remota en un dispositivo afectado, lo que podr\u00eda resultar en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad se presenta porque el per\u00edodo de tiempo de espera de la sesi\u00f3n predeterminada para conexiones de administraci\u00f3n remota espec\u00edficas es demasiado largo. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un n\u00famero grande y sostenido de conexiones de administraci\u00f3n remota dise\u00f1adas sobre un dispositivo afectado, resultando en una acumulaci\u00f3n de esas conexiones sobre el tiempo. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante causar que la interfaz de administraci\u00f3n remota o el Cisco Firepower Device Manager (FDM) dejen de responder y cause que otras funciones de administraci\u00f3n se desconecten, resultando en una condici\u00f3n DoS. El tr\u00e1fico del usuario que fluye a trav\u00e9s del dispositivo no estar\u00eda afectado, y la condici\u00f3n DoS estar\u00eda aislada para la administraci\u00f3n remota solamente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV30\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-613\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4.0\",\"versionEndExcluding\":\"6.4.0.9\",\"matchCriteriaId\":\"06741056-2BFD-4F88-917A-F581F813B69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.0\",\"versionEndExcluding\":\"6.5.0.5\",\"matchCriteriaId\":\"3ED0E59C-146C-494F-AD46-F6FB43F9C575\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5505_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D20B7556-CB33-4E96-8B4A-4E70C350079D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5505_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51DFD14D-033B-4AA3-B7C6-E5CE9EEF69DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5510_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC4AD47-1789-494E-949F-483CBC2EDF4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5510_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A9AF36E-F7F0-4A0E-B95D-2DF5584D5072\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B091B9BA-D4CA-435B-8D66-602B45F0E0BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5512-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39AC2543-8397-4CAD-A87C-10AD2F5672A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5512-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70CC1F85-2E5C-4939-9879-417484C58F5A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08F0F160-DAD2-48D4-B7B2-4818B2526F35\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5515-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"715FA7AF-438C-4B73-B411-F5242D82E6DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5515-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"028C5F69-DBAB-42DA-A759-555FACE4CF08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"977D597B-F6DE-4438-AB02-06BE64D71EBE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5520_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C833630-408A-4491-88E3-F8F50BC0988E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5520_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD20CA7A-9EF1-4BA5-883E-EB9791AB1982\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B387F62-6341-434D-903F-9B72E7F84ECB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5525-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"400F4C4E-75A0-420C-A3D0-35EBCA9439C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5525-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76F77E11-71F3-4197-871F-FEA1E53D7CFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB71EB29-0115-4307-A9F7-262394FD9FB0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5540_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28EE51A4-C914-4B9C-B483-A56E0AAA788F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5540_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33A3EB45-FDC6-4BAB-9E6D-96A463C1A9B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17C5A524-E1D9-480F-B655-0680AA5BF720\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5545-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA31C6C9-EC1F-4548-AF39-FD49DD98BBBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5545-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AA06D7D-A0BA-4B17-9EF3-165A203F8921\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57179F60-E330-4FF0-9664-B1E4637FF210\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5550_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C6DCED6-241A-4FB6-B2A4-B4E4DD3B7547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5550_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"414DE2B9-AE0A-4DE4-9D0A-8C1E11AF85D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6287D95-F564-44B7-A0F9-91396D7C2C4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5555-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611D736A-1C49-4FF7-BC6B-01D735771450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5555-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E584FE6-A477-4EFE-B562-35FC65229F26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5535C936-391B-4619-AA03-B35265FC15D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5580_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2CBAFBF-8727-43F3-9C9E-E3CCCF93BE29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5580_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B400A5F1-2DDA-4881-AB68-3F59262C981D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1E828B8-5ECC-4A09-B2AD-DEDC558713DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5585-x_firmware:9.8\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE020E81-C231-4975-9695-ECE383C32B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5585-x_firmware:101.6\\\\(1.96\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8D5DAF8-D27D-41A7-9912-580D657557E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16AE20C2-C77E-4E04-BF13-A48696E52426\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU\", \"name\": \"20200506 Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T07:24:00.646Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-3188\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-15T16:21:44.521244Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-15T16:22:23.251Z\"}}], \"cna\": {\"title\": \"Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability\", \"source\": {\"defect\": [[\"CSCvo31790\"]], \"advisory\": \"cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Firepower Threat Defense Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"datePublic\": \"2020-05-06T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU\", \"name\": \"20200506 Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-399\", \"description\": \"CWE-399\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2020-05-06T16:41:06\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"5.3\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}}, \"source\": {\"defect\": [[\"CSCvo31790\"]], \"advisory\": \"cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"Cisco Firepower Threat Defense Software\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU\", \"name\": \"20200506 Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability\", \"refsource\": \"CISCO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-399\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-3188\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2020-05-06T16:00:00-0700\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2020-3188\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-15T17:25:40.691Z\", \"dateReserved\": \"2019-12-12T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2020-05-06T16:41:06.457420Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…