8.6
CVE-2021-1402
- EPSS 0.22%
- Veröffentlicht 29.04.2021 18:15:08
- Zuletzt bearbeitet 21.11.2024 05:44:16
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the software-based SSL/TLS message handler of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of SSL/TLS messages when the device performs software-based SSL decryption. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message through an affected device. SSL/TLS messages sent to an affected device do not trigger this vulnerability. A successful exploit could allow the attacker to cause a process to crash. This crash would then trigger a reload of the device. No manual intervention is needed to recover the device after the reload.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Firepower Threat Defense Version >= 6.3.0 < 6.4.0
Cisco ≫ Firepower Threat Defense Virtual Version-
Cisco ≫ Asa 5512-x Version-
Cisco ≫ Asa 5515-x Version-
Cisco ≫ Asa 5525-x Version-
Cisco ≫ Asa 5545-x Version-
Cisco ≫ Asa 5555-x Version-
Cisco ≫ Firepower 1010 Version-
Cisco ≫ Firepower 1120 Version-
Cisco ≫ Firepower 1140 Version-
Cisco ≫ Firepower 1150 Version-
Cisco ≫ Firepower 2110 Version-
Cisco ≫ Firepower 2120 Version-
Cisco ≫ Firepower 2130 Version-
Cisco ≫ Firepower 2140 Version-
Cisco ≫ Isa 3000 Version-
Cisco ≫ Asa 5512-x Version-
Cisco ≫ Asa 5515-x Version-
Cisco ≫ Asa 5525-x Version-
Cisco ≫ Asa 5545-x Version-
Cisco ≫ Asa 5555-x Version-
Cisco ≫ Firepower 1010 Version-
Cisco ≫ Firepower 1120 Version-
Cisco ≫ Firepower 1140 Version-
Cisco ≫ Firepower 1150 Version-
Cisco ≫ Firepower 2110 Version-
Cisco ≫ Firepower 2120 Version-
Cisco ≫ Firepower 2130 Version-
Cisco ≫ Firepower 2140 Version-
Cisco ≫ Isa 3000 Version-
Cisco ≫ Firepower Threat Defense Version >= 6.5.0 < 6.6.0
Cisco ≫ Firepower Threat Defense Virtual Version-
Cisco ≫ Asa 5512-x Version-
Cisco ≫ Asa 5515-x Version-
Cisco ≫ Asa 5525-x Version-
Cisco ≫ Asa 5545-x Version-
Cisco ≫ Asa 5555-x Version-
Cisco ≫ Firepower 1010 Version-
Cisco ≫ Firepower 1120 Version-
Cisco ≫ Firepower 1140 Version-
Cisco ≫ Firepower 1150 Version-
Cisco ≫ Firepower 2110 Version-
Cisco ≫ Firepower 2120 Version-
Cisco ≫ Firepower 2130 Version-
Cisco ≫ Firepower 2140 Version-
Cisco ≫ Isa 3000 Version-
Cisco ≫ Asa 5512-x Version-
Cisco ≫ Asa 5515-x Version-
Cisco ≫ Asa 5525-x Version-
Cisco ≫ Asa 5545-x Version-
Cisco ≫ Asa 5555-x Version-
Cisco ≫ Firepower 1010 Version-
Cisco ≫ Firepower 1120 Version-
Cisco ≫ Firepower 1140 Version-
Cisco ≫ Firepower 1150 Version-
Cisco ≫ Firepower 2110 Version-
Cisco ≫ Firepower 2120 Version-
Cisco ≫ Firepower 2130 Version-
Cisco ≫ Firepower 2140 Version-
Cisco ≫ Isa 3000 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.22% | 0.41 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
nvd@nist.gov | 7.8 | 10 | 6.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:C
|
psirt@cisco.com | 8.6 | 3.9 | 4 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.