A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol inspection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors when handling specific SSL/TLS messages. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.
History

Tue, 19 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2019-08-08T07:35:27.076771Z

Updated: 2024-11-19T19:01:15.342Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1970

cve-icon Vulnrichment

Updated: 2024-08-04T18:35:52.019Z

cve-icon NVD

Status : Modified

Published: 2019-08-08T08:15:12.960

Modified: 2024-11-21T04:37:47.820

Link: CVE-2019-1970

cve-icon Redhat

No data.