ID

VAR-201811-0179


CVE

CVE-2018-15443


TITLE

Cisco Firepower System Software depletion vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-014054

DESCRIPTION

A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a configured Intrusion Prevention System (IPS) rule that inspects certain types of TCP traffic. The vulnerability is due to incorrect TCP retransmission handling. An attacker could exploit this vulnerability by sending a crafted TCP connection request through an affected device. A successful exploit could allow the attacker to bypass configured IPS rules and allow uninspected traffic onto the network. Cisco Firepower System The software is vulnerable to resource exhaustion.Information may be tampered with. Remote attackers can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. This issue is being tracked by Cisco Bug IDs CSCvk76547

Trust: 1.98

sources: NVD: CVE-2018-15443 // JVNDB: JVNDB-2018-014054 // BID: 105870 // VULHUB: VHN-125703

AFFECTED PRODUCTS

vendor:ciscomodel:firepower system softwarescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:firepower system softwarescope: - version: -

Trust: 0.8

vendor:ciscomodel:firepower system softwarescope:eqversion:0

Trust: 0.3

sources: BID: 105870 // JVNDB: JVNDB-2018-014054 // NVD: CVE-2018-15443

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15443
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2018-15443
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-15443
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201811-190
value: HIGH

Trust: 0.6

VULHUB: VHN-125703
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-15443
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-125703
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-15443
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

ykramarz@cisco.com: CVE-2018-15443
baseSeverity: MEDIUM
baseScore: 5.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-125703 // JVNDB: JVNDB-2018-014054 // CNNVD: CNNVD-201811-190 // NVD: CVE-2018-15443 // NVD: CVE-2018-15443

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.9

sources: VULHUB: VHN-125703 // JVNDB: JVNDB-2018-014054 // NVD: CVE-2018-15443

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201811-190

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201811-190

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014054

PATCH

title:cisco-sa-20181107-fde-tcp-bypassurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-fde-tcp-bypass

Trust: 0.8

title:Cisco Firepower System Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86661

Trust: 0.6

sources: JVNDB: JVNDB-2018-014054 // CNNVD: CNNVD-201811-190

EXTERNAL IDS

db:NVDid:CVE-2018-15443

Trust: 2.8

db:BIDid:105870

Trust: 2.0

db:JVNDBid:JVNDB-2018-014054

Trust: 0.8

db:CNNVDid:CNNVD-201811-190

Trust: 0.7

db:VULHUBid:VHN-125703

Trust: 0.1

sources: VULHUB: VHN-125703 // BID: 105870 // JVNDB: JVNDB-2018-014054 // CNNVD: CNNVD-201811-190 // NVD: CVE-2018-15443

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20181107-fde-tcp-bypass

Trust: 2.0

url:http://www.securityfocus.com/bid/105870

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15443

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-15443

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-125703 // BID: 105870 // JVNDB: JVNDB-2018-014054 // CNNVD: CNNVD-201811-190 // NVD: CVE-2018-15443

CREDITS

This vulnerability was found during the resolution of a Cisco TAC support case.

Trust: 0.6

sources: CNNVD: CNNVD-201811-190

SOURCES

db:VULHUBid:VHN-125703
db:BIDid:105870
db:JVNDBid:JVNDB-2018-014054
db:CNNVDid:CNNVD-201811-190
db:NVDid:CVE-2018-15443

LAST UPDATE DATE

2024-08-14T13:27:18.775000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-125703date:2019-10-09T00:00:00
db:BIDid:105870date:2018-11-07T00:00:00
db:JVNDBid:JVNDB-2018-014054date:2019-03-11T00:00:00
db:CNNVDid:CNNVD-201811-190date:2019-10-17T00:00:00
db:NVDid:CVE-2018-15443date:2019-10-09T23:35:38.423

SOURCES RELEASE DATE

db:VULHUBid:VHN-125703date:2018-11-08T00:00:00
db:BIDid:105870date:2018-11-07T00:00:00
db:JVNDBid:JVNDB-2018-014054date:2019-03-11T00:00:00
db:CNNVDid:CNNVD-201811-190date:2018-11-08T00:00:00
db:NVDid:CVE-2018-15443date:2018-11-08T17:29:00.653