ID

VAR-201705-3654


CVE

CVE-2017-6632


TITLE

Cisco FirePOWER System Software management resource management vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-004172

DESCRIPTION

A vulnerability in the logging configuration of Secure Sockets Layer (SSL) policies for Cisco FirePOWER System Software 5.3.0 through 6.2.2 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources. The vulnerability is due to the logging of certain TCP packets by the affected software. An attacker could exploit this vulnerability by sending a flood of crafted TCP packets to an affected device. A successful exploit could allow the attacker to cause a DoS condition. The success of an exploit is dependent on how an administrator has configured logging for SSL policies for a device. This vulnerability affects Cisco FirePOWER System Software that is configured to log connections by using SSL policy default actions. Cisco Bug IDs: CSCvd07072. Cisco FirePOWER System Software contains resource management vulnerabilities. Vendors have confirmed this vulnerability Bug ID CSCvd07072 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state

Trust: 1.98

sources: NVD: CVE-2017-6632 // JVNDB: JVNDB-2017-004172 // BID: 98523 // VULHUB: VHN-114835

AFFECTED PRODUCTS

vendor:ciscomodel:firepower threat defensescope:eqversion:6.0.1.3

Trust: 1.6

vendor:ciscomodel:firepower threat defensescope:eqversion:5.4.0

Trust: 1.6

vendor:ciscomodel:firepower threat defensescope:eqversion:5.3.0

Trust: 1.6

vendor:ciscomodel:firepower threat defensescope:eqversion:6.2.0

Trust: 1.6

vendor:ciscomodel:firepower threat defensescope:eqversion:6.0.0

Trust: 1.6

vendor:ciscomodel:firepower threat defensescope:eqversion:6.2.1

Trust: 1.6

vendor:ciscomodel:firepower threat defensescope:eqversion:6.2_base

Trust: 1.6

vendor:ciscomodel:firepower threat defensescope:eqversion:6.1.0

Trust: 1.6

vendor:ciscomodel:firepower threat defensescope:eqversion:6.1.0.2

Trust: 1.6

vendor:ciscomodel:firepower threat defensescope:eqversion:6.2.2

Trust: 1.6

vendor:ciscomodel:firepower threat defensescope:eqversion:6.0.1

Trust: 1.0

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:5.3.0 to 6.2.2

Trust: 0.8

vendor:ciscomodel:firepower system softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:firepower management centerscope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:firepower management centerscope:eqversion:6.1.0.2

Trust: 0.3

vendor:ciscomodel:firepower management centerscope:eqversion:6.0.1.3

Trust: 0.3

sources: BID: 98523 // JVNDB: JVNDB-2017-004172 // CNNVD: CNNVD-201705-913 // NVD: CVE-2017-6632

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6632
value: HIGH

Trust: 1.0

NVD: CVE-2017-6632
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201705-913
value: HIGH

Trust: 0.6

VULHUB: VHN-114835
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-6632
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-114835
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6632
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-114835 // JVNDB: JVNDB-2017-004172 // CNNVD: CNNVD-201705-913 // NVD: CVE-2017-6632

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

problemtype:CWE-400

Trust: 1.1

sources: VULHUB: VHN-114835 // JVNDB: JVNDB-2017-004172 // NVD: CVE-2017-6632

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201705-913

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201705-913

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-004172

PATCH

title:cisco-sa-20170517-fpwrurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-fpwr

Trust: 0.8

sources: JVNDB: JVNDB-2017-004172

EXTERNAL IDS

db:NVDid:CVE-2017-6632

Trust: 2.8

db:BIDid:98523

Trust: 2.0

db:JVNDBid:JVNDB-2017-004172

Trust: 0.8

db:CNNVDid:CNNVD-201705-913

Trust: 0.7

db:VULHUBid:VHN-114835

Trust: 0.1

sources: VULHUB: VHN-114835 // BID: 98523 // JVNDB: JVNDB-2017-004172 // CNNVD: CNNVD-201705-913 // NVD: CVE-2017-6632

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170517-fpwr

Trust: 2.0

url:http://www.securityfocus.com/bid/98523

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6632

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6632

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-114835 // BID: 98523 // JVNDB: JVNDB-2017-004172 // CNNVD: CNNVD-201705-913 // NVD: CVE-2017-6632

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 98523

SOURCES

db:VULHUBid:VHN-114835
db:BIDid:98523
db:JVNDBid:JVNDB-2017-004172
db:CNNVDid:CNNVD-201705-913
db:NVDid:CVE-2017-6632

LAST UPDATE DATE

2024-11-23T22:38:34.447000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-114835date:2019-10-09T00:00:00
db:BIDid:98523date:2017-05-17T00:00:00
db:JVNDBid:JVNDB-2017-004172date:2017-06-19T00:00:00
db:CNNVDid:CNNVD-201705-913date:2019-10-17T00:00:00
db:NVDid:CVE-2017-6632date:2024-11-21T03:30:10.513

SOURCES RELEASE DATE

db:VULHUBid:VHN-114835date:2017-05-22T00:00:00
db:BIDid:98523date:2017-05-17T00:00:00
db:JVNDBid:JVNDB-2017-004172date:2017-06-19T00:00:00
db:CNNVDid:CNNVD-201705-913date:2017-05-22T00:00:00
db:NVDid:CVE-2017-6632date:2017-05-22T01:29:00.243