5.3

CVE-2022-20940

A vulnerability in the TLS handler of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain access to sensitive information.

 This vulnerability is due to improper implementation of countermeasures against a Bleichenbacher attack on a device that uses SSL decryption policies. An attacker could exploit this vulnerability by sending crafted TLS messages to an affected device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack. A successful exploit could allow the attacker to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions to the affected device.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoFirepower Threat Defense Version >= 6.2.3 <= 6.2.3.18
CiscoFirepower Threat Defense Version >= 6.3.0 <= 6.3.0.5
CiscoFirepower Threat Defense Version >= 6.4.0 <= 6.4.0.14
CiscoFirepower Threat Defense Version >= 6.5.0 <= 6.5.0.5
CiscoFirepower Threat Defense Version >= 6.7.0 <= 6.7.0.3
CiscoFirepower Threat Defense Version >= 7.0.0 <= 7.0.3
CiscoFirepower Threat Defense Version6.6.0
CiscoFirepower Threat Defense Version6.6.0.1
CiscoFirepower Threat Defense Version6.6.1
CiscoFirepower Threat Defense Version6.6.3
CiscoFirepower Threat Defense Version6.6.4
CiscoFirepower Threat Defense Version6.6.5
CiscoFirepower Threat Defense Version6.6.5.1
CiscoFirepower Threat Defense Version6.6.5.2
CiscoFirepower Threat Defense Version7.1.0.0
CiscoFirepower Threat Defense Version7.1.0.1
CiscoFirepower Threat Defense Version7.1.0.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.13% 0.333
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
psirt@cisco.com 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-203 Observable Discrepancy

The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.