8.6
CVE-2020-3189
- EPSS 1.31%
- Veröffentlicht 06.05.2020 17:15:12
- Zuletzt bearbeitet 21.11.2024 05:30:30
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the VPN System Logging functionality for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a memory leak that can deplete system memory over time, which can cause unexpected system behaviors or device crashes. The vulnerability is due to the system memory not being properly freed for a VPN System Logging event generated when a VPN session is created or deleted. An attacker could exploit this vulnerability by repeatedly creating or deleting a VPN tunnel connection, which could leak a small amount of system memory for each logging event. A successful exploit could allow the attacker to cause system memory depletion, which can lead to a systemwide denial of service (DoS) condition. The attacker does not have any control of whether VPN System Logging is configured or not on the device, but it is enabled by default.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Firepower Threat Defense Version6.2.3.12
Cisco ≫ Firepower Threat Defense Version6.2.3.13
Cisco ≫ Firepower Threat Defense Version6.2.3.14
Cisco ≫ Firepower Threat Defense Version6.2.3.15
Cisco ≫ Asa 5505 Firmware Version9.9(2)
Cisco ≫ Asa 5505 Firmware Version9.9(2.21)
Cisco ≫ Asa 5505 Firmware Version9.9(2.52)
Cisco ≫ Asa 5505 Firmware Version9.9(2.55)
Cisco ≫ Asa 5510 Firmware Version9.9(2)
Cisco ≫ Asa 5510 Firmware Version9.9(2.21)
Cisco ≫ Asa 5510 Firmware Version9.9(2.52)
Cisco ≫ Asa 5510 Firmware Version9.9(2.55)
Cisco ≫ Asa 5512-x Firmware Version9.9(2)
Cisco ≫ Asa 5512-x Firmware Version9.9(2.21)
Cisco ≫ Asa 5512-x Firmware Version9.9(2.52)
Cisco ≫ Asa 5512-x Firmware Version9.9(2.55)
Cisco ≫ Asa 5515-x Firmware Version9.9(2)
Cisco ≫ Asa 5515-x Firmware Version9.9(2.21)
Cisco ≫ Asa 5515-x Firmware Version9.9(2.52)
Cisco ≫ Asa 5515-x Firmware Version9.9(2.55)
Cisco ≫ Asa 5520 Firmware Version9.9(2)
Cisco ≫ Asa 5520 Firmware Version9.9(2.21)
Cisco ≫ Asa 5520 Firmware Version9.9(2.52)
Cisco ≫ Asa 5520 Firmware Version9.9(2.55)
Cisco ≫ Asa 5525-x Firmware Version9.9(2)
Cisco ≫ Asa 5525-x Firmware Version9.9(2.21)
Cisco ≫ Asa 5525-x Firmware Version9.9(2.52)
Cisco ≫ Asa 5525-x Firmware Version9.9(2.55)
Cisco ≫ Asa 5540 Firmware Version9.9(2)
Cisco ≫ Asa 5540 Firmware Version9.9(2.21)
Cisco ≫ Asa 5540 Firmware Version9.9(2.52)
Cisco ≫ Asa 5540 Firmware Version9.9(2.55)
Cisco ≫ Asa 5545-x Firmware Version9.9(2)
Cisco ≫ Asa 5545-x Firmware Version9.9(2.21)
Cisco ≫ Asa 5545-x Firmware Version9.9(2.52)
Cisco ≫ Asa 5545-x Firmware Version9.9(2.55)
Cisco ≫ Asa 5550 Firmware Version9.9(2)
Cisco ≫ Asa 5550 Firmware Version9.9(2.21)
Cisco ≫ Asa 5550 Firmware Version9.9(2.52)
Cisco ≫ Asa 5550 Firmware Version9.9(2.55)
Cisco ≫ Asa 5555-x Firmware Version9.9(2)
Cisco ≫ Asa 5555-x Firmware Version9.9(2.21)
Cisco ≫ Asa 5555-x Firmware Version9.9(2.52)
Cisco ≫ Asa 5555-x Firmware Version9.9(2.55)
Cisco ≫ Asa 5580 Firmware Version9.9(2)
Cisco ≫ Asa 5580 Firmware Version9.9(2.21)
Cisco ≫ Asa 5580 Firmware Version9.9(2.52)
Cisco ≫ Asa 5580 Firmware Version9.9(2.55)
Cisco ≫ Asa 5585-x Firmware Version9.9(2)
Cisco ≫ Asa 5585-x Firmware Version9.9(2.21)
Cisco ≫ Asa 5585-x Firmware Version9.9(2.52)
Cisco ≫ Asa 5585-x Firmware Version9.9(2.55)
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.31% | 0.779 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
psirt@cisco.com | 8.6 | 3.9 | 4 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
CWE-400 Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CWE-401 Missing Release of Memory after Effective Lifetime
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.