ID

VAR-202010-1020


CVE

CVE-2020-3529


TITLE

Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software exhaustion vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-009727

DESCRIPTION

A vulnerability in the SSL VPN negotiation process for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to inefficient direct memory access (DMA) memory management during the negotiation phase of an SSL VPN connection. An attacker could exploit this vulnerability by sending a steady stream of crafted Datagram TLS (DTLS) traffic to an affected device. A successful exploit could allow the attacker to exhaust DMA memory on the device and cause a DoS condition. The platform provides features such as highly secure access to data and network resources

Trust: 1.8

sources: NVD: CVE-2020-3529 // JVNDB: JVNDB-2020-009727 // VULHUB: VHN-181654 // VULMON: CVE-2020-3529

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.9.2.80

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:gteversion:6.4.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.8.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.14.1.30

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.8.4.29

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:gteversion:6.6.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:gteversion:6.5.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.4.0.10

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.12.4.4

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.5.0.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.10.1.44

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.12.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.3.0.6

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.10.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.13.1.13

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.13.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliancescope:ltversion:9.6.4.45

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.6.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.14.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.9.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope: - version: -

Trust: 0.8

vendor:ciscomodel:firepower threat defense softwarescope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-009727 // NVD: CVE-2020-3529

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3529
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3529
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-009727
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202010-1158
value: HIGH

Trust: 0.6

VULHUB: VHN-181654
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-3529
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-3529
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-009727
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-181654
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3529
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3529
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-009727
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-181654 // VULMON: CVE-2020-3529 // JVNDB: JVNDB-2020-009727 // CNNVD: CNNVD-202010-1158 // NVD: CVE-2020-3529 // NVD: CVE-2020-3529

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.9

sources: VULHUB: VHN-181654 // JVNDB: JVNDB-2020-009727 // NVD: CVE-2020-3529

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202010-1158

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202010-1158

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-009727

PATCH

title:cisco-sa-asaftd-sslvpndma-dos-HRrqB9Yxurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-sslvpndma-dos-HRrqB9Yx

Trust: 0.8

sources: JVNDB: JVNDB-2020-009727

EXTERNAL IDS

db:NVDid:CVE-2020-3529

Trust: 2.6

db:JVNDBid:JVNDB-2020-009727

Trust: 0.8

db:CNNVDid:CNNVD-202010-1158

Trust: 0.7

db:AUSCERTid:ESB-2020.3642.3

Trust: 0.6

db:AUSCERTid:ESB-2020.3642

Trust: 0.6

db:NSFOCUSid:50231

Trust: 0.6

db:CNVDid:CNVD-2021-44680

Trust: 0.1

db:VULHUBid:VHN-181654

Trust: 0.1

db:VULMONid:CVE-2020-3529

Trust: 0.1

sources: VULHUB: VHN-181654 // VULMON: CVE-2020-3529 // JVNDB: JVNDB-2020-009727 // CNNVD: CNNVD-202010-1158 // NVD: CVE-2020-3529

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-asaftd-sslvpndma-dos-hrrqb9yx

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-3529

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3529

Trust: 0.8

url:https://vigilance.fr/vulnerability/cisco-asa-software-denial-of-service-via-ssl-vpn-direct-memory-access-33673

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3642.3

Trust: 0.6

url:http://www.nsfocus.net/vulndb/50231

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3642/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-181654 // VULMON: CVE-2020-3529 // JVNDB: JVNDB-2020-009727 // CNNVD: CNNVD-202010-1158 // NVD: CVE-2020-3529

SOURCES

db:VULHUBid:VHN-181654
db:VULMONid:CVE-2020-3529
db:JVNDBid:JVNDB-2020-009727
db:CNNVDid:CNNVD-202010-1158
db:NVDid:CVE-2020-3529

LAST UPDATE DATE

2024-08-14T13:54:28.161000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-181654date:2020-10-30T00:00:00
db:VULMONid:CVE-2020-3529date:2020-10-30T00:00:00
db:JVNDBid:JVNDB-2020-009727date:2020-12-02T07:45:45
db:CNNVDid:CNNVD-202010-1158date:2021-06-30T00:00:00
db:NVDid:CVE-2020-3529date:2023-11-07T03:22:51.960

SOURCES RELEASE DATE

db:VULHUBid:VHN-181654date:2020-10-21T00:00:00
db:VULMONid:CVE-2020-3529date:2020-10-21T00:00:00
db:JVNDBid:JVNDB-2020-009727date:2020-12-02T07:45:45
db:CNNVDid:CNNVD-202010-1158date:2020-10-21T00:00:00
db:NVDid:CVE-2020-3529date:2020-10-21T19:15:16.967