Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-20339", "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "state": "PUBLISHED", "assignerShortName": "cisco", "dateReserved": "2023-11-08T15:08:07.642Z", "datePublished": "2024-10-23T17:09:01.598Z", "dateUpdated": "2024-10-24T16:16:52.824Z"}, "containers": {"cna": {"title": "Cisco Firepower Threat Defense Software for Firepower 2100 Series TLS Denial of Service Vulnerability", "metrics": [{"format": "cvssV3_1", "cvssV3_1": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "baseScore": 8.6, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}}], "descriptions": [{"lang": "en", "value": "A vulnerability in the TLS processing feature of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to an issue that occurs when TLS traffic is processed. An attacker could exploit this vulnerability by sending certain TLS traffic over IPv4 through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition and impacting traffic to and through the affected device."}], "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-QXYE5Ufy", "name": "cisco-sa-ftd-tls-dos-QXYE5Ufy"}, {"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO"}, {"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", "name": "Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication"}], "exploits": [{"lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}], "source": {"advisory": "cisco-sa-ftd-tls-dos-QXYE5Ufy", "discovery": "INTERNAL", "defects": ["CSCwh68482"]}, "problemTypes": [{"descriptions": [{"lang": "en", "description": "NULL Pointer Dereference", "type": "cwe", "cweId": "CWE-476"}]}], "affected": [{"vendor": "Cisco", "product": "Cisco Firepower Threat Defense Software", "versions": [{"version": "6.2.3", "status": "affected"}, {"version": "6.2.3.9", "status": "affected"}, {"version": "6.2.3.1", "status": "affected"}, {"version": "6.2.3.2", "status": "affected"}, {"version": "6.2.3.10", "status": "affected"}, {"version": "6.4.0", "status": "affected"}, {"version": "6.4.0.3", "status": "affected"}, {"version": "6.4.0.4", "status": "affected"}, {"version": "6.2.3.15", "status": "affected"}, {"version": "6.2.3.6", "status": "affected"}, {"version": "6.2.3.7", "status": "affected"}, {"version": "6.2.3.12", "status": "affected"}, {"version": "6.2.3.3", "status": "affected"}, {"version": "6.2.3.11", "status": "affected"}, {"version": "6.4.0.6", "status": "affected"}, {"version": "6.2.3.13", "status": "affected"}, {"version": "6.2.3.8", "status": "affected"}, {"version": "6.2.3.4", "status": "affected"}, {"version": "6.4.0.1", "status": "affected"}, {"version": "6.2.3.5", "status": "affected"}, {"version": "6.4.0.5", "status": "affected"}, {"version": "6.2.3.14", "status": "affected"}, {"version": "6.4.0.2", "status": "affected"}, {"version": "6.4.0.8", "status": "affected"}, {"version": "6.4.0.7", "status": "affected"}, {"version": "6.6.0", "status": "affected"}, {"version": "6.4.0.9", "status": "affected"}, {"version": "6.2.3.16", "status": "affected"}, {"version": "6.6.0.1", "status": "affected"}, {"version": "6.6.1", "status": "affected"}, {"version": "6.4.0.10", "status": "affected"}, {"version": "6.7.0", "status": "affected"}, {"version": "6.4.0.11", "status": "affected"}, {"version": "6.6.3", "status": "affected"}, {"version": "6.7.0.1", "status": "affected"}, {"version": "6.6.4", "status": "affected"}, {"version": "6.4.0.12", "status": "affected"}, {"version": "6.7.0.2", "status": "affected"}, {"version": "7.0.0", "status": "affected"}, {"version": "6.2.3.17", "status": "affected"}, {"version": "7.0.0.1", "status": "affected"}, {"version": "6.6.5", "status": "affected"}, {"version": "7.0.1", "status": "affected"}, {"version": "7.1.0", "status": "affected"}, {"version": "6.4.0.13", "status": "affected"}, {"version": "6.6.5.1", "status": "affected"}, {"version": "6.2.3.18", "status": "affected"}, {"version": "7.0.1.1", "status": "affected"}, {"version": "6.7.0.3", "status": "affected"}, {"version": "6.4.0.14", "status": "affected"}, {"version": "7.1.0.1", "status": "affected"}, {"version": "6.6.5.2", "status": "affected"}, {"version": "7.0.2", "status": "affected"}, {"version": "6.4.0.15", "status": "affected"}, {"version": "7.2.0", "status": "affected"}, {"version": "7.0.2.1", "status": "affected"}, {"version": "7.0.3", "status": "affected"}, {"version": "6.6.7", "status": "affected"}, {"version": "7.2.0.1", "status": "affected"}, {"version": "7.0.4", "status": "affected"}, {"version": "7.2.1", "status": "affected"}, {"version": "7.0.5", "status": "affected"}, {"version": "6.4.0.16", "status": "affected"}, {"version": "7.3.0", "status": "affected"}, {"version": "7.2.2", "status": "affected"}, {"version": "6.6.7.1", "status": "affected"}, {"version": "7.2.3", "status": "affected"}, {"version": "7.3.1", "status": "affected"}, {"version": "7.1.0.3", "status": "affected"}, {"version": "7.2.4", "status": "affected"}, {"version": "7.0.6", "status": "affected"}, {"version": "7.2.5", "status": "affected"}, {"version": "7.2.4.1", "status": "affected"}, {"version": "7.3.1.1", "status": "affected"}, {"version": "6.4.0.17", "status": "affected"}, {"version": "7.0.6.1", "status": "affected"}, {"version": "7.2.5.1", "status": "affected"}, {"version": "6.6.7.2", "status": "affected"}, {"version": "7.2.5.2", "status": "affected"}, {"version": "7.3.1.2", "status": "affected"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco", "dateUpdated": "2024-10-23T17:09:01.598Z"}}, "adp": [{"affected": [{"vendor": "cisco", "product": "firepower_threat_defense_software", "cpes": ["cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "6.2.3", "status": "affected", "lessThanOrEqual": "6.2.3.18", "versionType": "custom"}, {"version": "6.4.0", "status": "affected", "lessThanOrEqual": "6.4.0.17", "versionType": "custom"}, {"version": "6.6.0", "status": "affected", "lessThanOrEqual": "6.6.7.2", "versionType": "custom"}, {"version": "6.7.0", "status": "affected", "lessThanOrEqual": "6.7.0.3", "versionType": "custom"}, {"version": "7.0.0", "status": "affected", "lessThanOrEqual": "7.0.6.1", "versionType": "custom"}, {"version": "7.1.0", "status": "affected", "lessThanOrEqual": "7.1.0.3", "versionType": "custom"}, {"version": "7.2.0", "status": "affected", "lessThanOrEqual": "7.2.5.2", "versionType": "custom"}, {"version": "7.3.0", "status": "affected", "lessThanOrEqual": "7.3.1.2", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-23T18:42:47.061307Z", "id": "CVE-2024-20339", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-24T16:16:52.824Z"}}]}}