8.6
CVE-2021-34781
- EPSS 0.43%
- Published 27.10.2021 19:15:08
- Last modified 21.11.2024 06:11:11
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the processing of SSH connections for multi-instance deployments of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to a lack of proper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, which causes a DoS condition on the affected device. The device must be manually reloaded to recover.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Firepower Management Center Virtual Appliance Version6.3.0
Cisco ≫ Firepower Management Center Virtual Appliance Version6.4.0
Cisco ≫ Firepower Management Center Virtual Appliance Version6.4.0.13
Cisco ≫ Firepower Management Center Virtual Appliance Version6.5.0
Cisco ≫ Firepower Management Center Virtual Appliance Version6.6.0
Cisco ≫ Firepower Management Center Virtual Appliance Version6.7.0.3
Cisco ≫ Firepower Management Center Virtual Appliance Version6.7.1
Cisco ≫ Firepower Management Center Virtual Appliance Version7.0.0
Cisco ≫ Firepower Threat Defense Version >= 6.3.0 < 6.4.0.13
Cisco ≫ Firepower Threat Defense Version >= 6.5.0 < 6.6.5
Cisco ≫ Firepower Threat Defense Version >= 6.7.0 < 6.7.0.3
Cisco ≫ Firepower Threat Defense Version >= 7.0.0 < 7.0.1
Cisco ≫ Sourcefire Defense Center Version6.3.0
Cisco ≫ Sourcefire Defense Center Version6.4.0
Cisco ≫ Sourcefire Defense Center Version6.4.0.13
Cisco ≫ Sourcefire Defense Center Version6.5.0
Cisco ≫ Sourcefire Defense Center Version6.6.0
Cisco ≫ Sourcefire Defense Center Version6.7.0.3
Cisco ≫ Sourcefire Defense Center Version6.7.1
Cisco ≫ Sourcefire Defense Center Version7.0.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.43% | 0.596 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 7.1 | 8.6 | 6.9 |
AV:N/AC:M/Au:N/C:N/I:N/A:C
|
psirt@cisco.com | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
CWE-755 Improper Handling of Exceptional Conditions
The product does not handle or incorrectly handles an exceptional condition.