ID

VAR-201901-0370


CVE

CVE-2019-1669


TITLE

Cisco Firepower Threat Defense Vulnerability in protection mechanism

Trust: 0.8

sources: JVNDB: JVNDB-2019-001418

DESCRIPTION

A vulnerability in the data acquisition (DAQ) component of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured access control policies or cause a denial of service (DoS) condition. The vulnerability exists because the affected software improperly manages system memory resources when inspecting traffic. An attacker could exploit this vulnerability by generating specific traffic patterns for the software to inspect. A successful exploit could allow the attacker to exhaust system memory resources used for traffic inspection. Depending on the configuration, the FTD Software could fail open and cease to inspect traffic or fail closed and result in a DoS condition. This vulnerability may require manual intervention to restore the software. Cisco Firepower Threat Defense (FTD) Contains a vulnerability related to failure of the protection mechanism.Service operation interruption (DoS) There is a possibility of being put into a state. Remote attackers can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. This issue is being tracked by Cisco Bug IDs CSCvo02577. data acquisition (DAQ) is one of the data acquisition components

Trust: 1.98

sources: NVD: CVE-2019-1669 // JVNDB: JVNDB-2019-001418 // BID: 106721 // VULHUB: VHN-148861

AFFECTED PRODUCTS

vendor:ciscomodel:firepower threat defensescope:eqversion:6.3.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.4.0

Trust: 1.0

vendor:ciscomodel:firepower threat defense softwarescope: - version: -

Trust: 0.8

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.3

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:0

Trust: 0.3

sources: BID: 106721 // JVNDB: JVNDB-2019-001418 // NVD: CVE-2019-1669

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1669
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1669
value: HIGH

Trust: 1.0

NVD: CVE-2019-1669
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201901-879
value: HIGH

Trust: 0.6

VULHUB: VHN-148861
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-1669
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-148861
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-1669
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.0

Trust: 1.8

ykramarz@cisco.com: CVE-2019-1669
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-148861 // JVNDB: JVNDB-2019-001418 // CNNVD: CNNVD-201901-879 // NVD: CVE-2019-1669 // NVD: CVE-2019-1669

PROBLEMTYPE DATA

problemtype:CWE-693

Trust: 1.9

sources: VULHUB: VHN-148861 // JVNDB: JVNDB-2019-001418 // NVD: CVE-2019-1669

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-879

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201901-879

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-001418

PATCH

title:cisco-sa-20190123-firepowertds-bypassurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-firepowertds-bypass

Trust: 0.8

title:Cisco Firepower Threat Defense Software data acquisition Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88948

Trust: 0.6

sources: JVNDB: JVNDB-2019-001418 // CNNVD: CNNVD-201901-879

EXTERNAL IDS

db:NVDid:CVE-2019-1669

Trust: 2.8

db:BIDid:106721

Trust: 2.0

db:JVNDBid:JVNDB-2019-001418

Trust: 0.8

db:CNNVDid:CNNVD-201901-879

Trust: 0.7

db:CNVDid:CNVD-2020-12741

Trust: 0.1

db:VULHUBid:VHN-148861

Trust: 0.1

sources: VULHUB: VHN-148861 // BID: 106721 // JVNDB: JVNDB-2019-001418 // CNNVD: CNNVD-201901-879 // NVD: CVE-2019-1669

REFERENCES

url:http://www.securityfocus.com/bid/106721

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190123-firepowertds-bypass

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1669

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-1669

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-148861 // BID: 106721 // JVNDB: JVNDB-2019-001418 // CNNVD: CNNVD-201901-879 // NVD: CVE-2019-1669

CREDITS

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.,The vendor reported this issue.

Trust: 0.6

sources: CNNVD: CNNVD-201901-879

SOURCES

db:VULHUBid:VHN-148861
db:BIDid:106721
db:JVNDBid:JVNDB-2019-001418
db:CNNVDid:CNNVD-201901-879
db:NVDid:CVE-2019-1669

LAST UPDATE DATE

2024-11-23T23:08:28.302000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-148861date:2019-10-09T00:00:00
db:BIDid:106721date:2019-01-23T00:00:00
db:JVNDBid:JVNDB-2019-001418date:2019-03-05T00:00:00
db:CNNVDid:CNNVD-201901-879date:2019-10-17T00:00:00
db:NVDid:CVE-2019-1669date:2024-11-21T04:37:03.550

SOURCES RELEASE DATE

db:VULHUBid:VHN-148861date:2019-01-24T00:00:00
db:BIDid:106721date:2019-01-23T00:00:00
db:JVNDBid:JVNDB-2019-001418date:2019-03-05T00:00:00
db:CNNVDid:CNNVD-201901-879date:2019-01-24T00:00:00
db:NVDid:CVE-2019-1669date:2019-01-24T16:29:00.597