A vulnerability in SSL traffic decryption for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause depletion of system memory, aka a Firepower Detection Engine SSL Decryption Memory Consumption Denial of Service vulnerability. If this memory leak persists over time, a denial of service (DoS) condition could develop because traffic can cease to be forwarded through the device. The vulnerability is due to an error in how the Firepower Detection Snort Engine handles SSL traffic decryption and notifications to and from the Adaptive Security Appliance (ASA) handler. An attacker could exploit this vulnerability by sending a steady stream of malicious Secure Sockets Layer (SSL) traffic through the device. An exploit could allow the attacker to cause a DoS condition when the device runs low on system memory. This vulnerability affects Cisco Firepower Threat Defense (FTD) Software Releases 6.0.1 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls, Firepower 2100 Series Security Appliances, Firepower 4100 Series Security Appliances, Firepower 9300 Series Security Appliances. Cisco Bug IDs: CSCve02069.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Nov 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco secure Firewall Management Center
|
|
CPEs | cpe:2.3:a:cisco:firepower_management_center:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:6.1.0.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:6.2.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:6.2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:6.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:6.2.2:*:*:*:*:*:*:* |
cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:* |
Vendors & Products |
Cisco firepower Management Center
|
Cisco secure Firewall Management Center
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2017-10-05T07:00:00
Updated: 2024-08-05T18:28:16.699Z
Reserved: 2017-08-03T00:00:00
Link: CVE-2017-12245
Vulnrichment
No data.
NVD
Status : Modified
Published: 2017-10-05T07:29:00.307
Modified: 2024-11-26T16:09:02.407
Link: CVE-2017-12245
Redhat
No data.