A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass configured file action policies if an Intelligent Application Bypass (IAB) with a drop percentage threshold is also configured. The vulnerability is due to incorrect counting of the percentage of dropped traffic. An attacker could exploit this vulnerability by sending network traffic to a targeted device. An exploit could allow the attacker to bypass configured file action policies, and traffic that should be dropped could be allowed into the network. Cisco Bug IDs: CSCvf86435.

Project Subscriptions

Vendors Products
Amp 7150 Subscribe
Amp 8150 Subscribe
Firepower Appliance 7010 Subscribe
Firepower Appliance 7020 Subscribe
Firepower Appliance 7030 Subscribe
Firepower Appliance 7050 Subscribe
Firepower Appliance 7110 Subscribe
Firepower Appliance 7115 Subscribe
Firepower Appliance 7120 Subscribe
Firepower Appliance 7125 Subscribe
Firepower Appliance 8120 Subscribe
Firepower Appliance 8130 Subscribe
Firepower Appliance 8140 Subscribe
Firepower Appliance 8250 Subscribe
Firepower Appliance 8260 Subscribe
Firepower Appliance 8270 Subscribe
Firepower Appliance 8290 Subscribe
Firepower Appliance 8350 Subscribe
Firepower Appliance 8360 Subscribe
Firepower Appliance 8370 Subscribe
Firepower Appliance 8390 Subscribe
Firepower Management Center 1000 Subscribe
Firepower Management Center 2000 Subscribe
Firepower Management Center 2500 Subscribe
Firepower Management Center 4000 Subscribe
Firepower Management Center 4500 Subscribe
Firepower Threat Defense Subscribe
Firesight Management Center 1500 Subscribe
Firesight Management Center 3500 Subscribe
Firesight Management Center 750 Subscribe
Ngips Virtual Appliance Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2018-1077 A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass configured file action policies if an Intelligent Application Bypass (IAB) with a drop percentage threshold is also configured. The vulnerability is due to incorrect counting of the percentage of dropped traffic. An attacker could exploit this vulnerability by sending network traffic to a targeted device. An exploit could allow the attacker to bypass configured file action policies, and traffic that should be dropped could be allowed into the network. Cisco Bug IDs: CSCvf86435.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 29 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-29T15:16:11.647Z

Reserved: 2017-11-27T00:00:00

Link: CVE-2018-0254

cve-icon Vulnrichment

Updated: 2024-08-05T03:21:14.430Z

cve-icon NVD

Status : Modified

Published: 2018-04-19T20:29:01.127

Modified: 2024-11-21T03:37:49.460

Link: CVE-2018-0254

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses