gsd-2023-20083
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A vulnerability in ICMPv6 inspection when configured with the Snort 2 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the CPU of an affected device to spike to 100 percent, which could stop all traffic processing and result in a denial of service (DoS) condition. FTD management traffic is not affected by this vulnerability. This vulnerability is due to improper error checking when parsing fields within the ICMPv6 header. An attacker could exploit this vulnerability by sending a crafted ICMPv6 packet through an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition. Note: To recover from the DoS condition, the Snort 2 Detection Engine or the Cisco FTD device may need to be restarted.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2023-20083",
    "id": "GSD-2023-20083"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2023-20083"
      ],
      "details": "A vulnerability in ICMPv6 inspection when configured with the Snort 2 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the CPU of an affected device to spike to 100 percent, which could stop all traffic processing and result in a denial of service (DoS) condition. FTD management traffic is not affected by this vulnerability. This vulnerability is due to improper error checking when parsing fields within the ICMPv6 header. An attacker could exploit this vulnerability by sending a crafted ICMPv6 packet through an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition. Note: To recover from the DoS condition, the Snort 2 Detection Engine or the Cisco FTD device may need to be restarted.",
      "id": "GSD-2023-20083",
      "modified": "2023-12-13T01:20:27.719524Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "psirt@cisco.com",
        "ID": "CVE-2023-20083",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Cisco Firepower Threat Defense Software",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.4"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.5"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.6"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.7"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.8"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.10"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.11"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.9"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.12"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.13"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.14"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.15"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.16"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.17"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.2.3.18"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.6.0"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.6.0.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.6.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.6.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.6.4"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.6.5"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.6.5.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.6.5.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.6.7"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.6.7.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.4"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.5"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.6"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.7"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.8"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.9"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.10"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.11"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.12"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.13"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.14"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.15"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.16"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.4.0.17"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.7.0"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.7.0.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.7.0.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "6.7.0.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.0.0"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.0.0.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.0.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.0.1.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.0.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.0.2.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.0.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.0.4"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.0.5"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.1.0"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.1.0.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.1.0.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.1.0.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.2.0"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.2.0.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.2.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.2.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.2.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.3.0"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.3.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "7.3.1.1"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Cisco"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "A vulnerability in ICMPv6 inspection when configured with the Snort 2 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the CPU of an affected device to spike to 100 percent, which could stop all traffic processing and result in a denial of service (DoS) condition. FTD management traffic is not affected by this vulnerability. This vulnerability is due to improper error checking when parsing fields within the ICMPv6 header. An attacker could exploit this vulnerability by sending a crafted ICMPv6 packet through an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition. Note: To recover from the DoS condition, the Snort 2 Detection Engine or the Cisco FTD device may need to be restarted."
          }
        ]
      },
      "exploit": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "impact": {
        "cvss": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-835",
                "lang": "eng",
                "value": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-icmpv6-dos-4eMkLuN",
            "refsource": "MISC",
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-icmpv6-dos-4eMkLuN"
          }
        ]
      },
      "source": {
        "advisory": "cisco-sa-ftd-icmpv6-dos-4eMkLuN",
        "defects": [
          "CSCwc20635"
        ],
        "discovery": "INTERNAL"
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D58D7217-F6F5-4B58-B59C-E5C8781C87A9",
                    "versionEndIncluding": "6.2.3.18",
                    "versionStartIncluding": "6.2.3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5156C270-7E41-4D2E-B051-F35563EA4402",
                    "versionEndIncluding": "6.4.0.17",
                    "versionStartIncluding": "6.4.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BCDEBE63-3174-4BBC-82DE-E8E25C818E30",
                    "versionEndIncluding": "6.6.7.1",
                    "versionStartIncluding": "6.6.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1110632C-526F-4025-A7BE-0CF9F37E5F9E",
                    "versionEndIncluding": "6.7.0.3",
                    "versionStartIncluding": "6.7.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3F51D1A7-A702-4071-85D8-7C77CEB23955",
                    "versionEndIncluding": "7.0.5",
                    "versionStartIncluding": "7.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F5F30710-F91A-4A7B-AB06-EE49525E6F04",
                    "versionEndIncluding": "7.1.0.3",
                    "versionStartIncluding": "7.1.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "90854884-399A-465B-ACB7-E493B8D39041",
                    "versionEndIncluding": "7.2.3",
                    "versionStartIncluding": "7.2.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E4350E85-F009-4F8A-952E-BDA774CE809E",
                    "versionEndIncluding": "7.3.1.1",
                    "versionStartIncluding": "7.3.0",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "A vulnerability in ICMPv6 inspection when configured with the Snort 2 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the CPU of an affected device to spike to 100 percent, which could stop all traffic processing and result in a denial of service (DoS) condition. FTD management traffic is not affected by this vulnerability. This vulnerability is due to improper error checking when parsing fields within the ICMPv6 header. An attacker could exploit this vulnerability by sending a crafted ICMPv6 packet through an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition. Note: To recover from the DoS condition, the Snort 2 Detection Engine or the Cisco FTD device may need to be restarted."
          },
          {
            "lang": "es",
            "value": "Una vulnerabilidad en la inspecci\u00f3n ICMPv6 cuando se configura con el motor de detecci\u00f3n Snort 2 para el software Cisco Firepower Threat Defense (FTD) podr\u00eda permitir que un atacante remoto no autenticado haga que la CPU de un dispositivo afectado aumente al 100 por ciento, lo que podr\u00eda detener todo el procesamiento del tr\u00e1fico y resultar en una condici\u00f3n de Denegaci\u00f3n de Servicio (DoS). El tr\u00e1fico de gesti\u00f3n de FTD no se ve afectado por esta vulnerabilidad. Esta vulnerabilidad se debe a una comprobaci\u00f3n incorrecta de errores al analizar campos dentro del encabezado ICMPv6. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete ICMPv6 manipulado a trav\u00e9s de un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante hacer que el dispositivo agote los recursos de la CPU y deje de procesar el tr\u00e1fico, lo que resultar\u00eda en una condici\u00f3n DoS. Nota: Para recuperarse de la condici\u00f3n DoS, es posible que sea necesario reiniciar el motor de detecci\u00f3n Snort 2 o el dispositivo Cisco FTD."
          }
        ],
        "id": "CVE-2023-20083",
        "lastModified": "2024-01-25T17:15:28.860",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 8.6,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "NONE",
                "integrityImpact": "NONE",
                "privilegesRequired": "NONE",
                "scope": "CHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 4.0,
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 8.6,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "NONE",
                "integrityImpact": "NONE",
                "privilegesRequired": "NONE",
                "scope": "CHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 4.0,
              "source": "ykramarz@cisco.com",
              "type": "Secondary"
            }
          ]
        },
        "published": "2023-11-01T18:15:09.143",
        "references": [
          {
            "source": "ykramarz@cisco.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-icmpv6-dos-4eMkLuN"
          }
        ],
        "sourceIdentifier": "ykramarz@cisco.com",
        "vulnStatus": "Modified",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "NVD-CWE-noinfo"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          },
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-835"
              }
            ],
            "source": "ykramarz@cisco.com",
            "type": "Secondary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.