Cisco Firepower System Software Snort Detection Engine TCP Connection cryptographic issues

CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.6 | $0-$5k | 0.00 |
A vulnerability classified as problematic was found in Cisco Firepower System Software (Firewall Software) (version now known). This vulnerability affects some unknown processing of the component Snort Detection Engine. The manipulation as part of a TCP Connection leads to a cryptographic issues vulnerability. The CWE definition for the vulnerability is CWE-310. As an impact it is known to affect availability. CVE summarizes:
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to restart an instance of the Snort detection engine on an affected device, resulting in a brief denial of service (DoS) condition. The vulnerability is due to the incorrect handling of Transport Layer Security (TLS) TCP connection setup for the affected software. An attacker could exploit this vulnerability by sending crafted TLS traffic to an affected device. A successful exploit could allow the attacker to cause the Snort detection engine on the affected device to restart, resulting in a DoS condition. Cisco Bug IDs: CSCvg99327.
The bug was discovered 05/02/2018. The weakness was presented 05/02/2018 as cisco-sa-20180502-fpwr-codp as confirmed advisory (Website). The advisory is available at tools.cisco.com. This vulnerability was named CVE-2018-0283 since 11/27/2017. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. The technical details are unknown and an exploit is not available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 11/26/2024). This vulnerability is assigned to T1600 by the MITRE ATT&CK project.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the vulnerability database at SecurityFocus (BID 104121†). See VDB-117297 and VDB-117296 for similar entries.
Product
Type
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.6VulDB Meta Temp Score: 5.6
VulDB Base Score: 5.3
VulDB Temp Score: 5.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 5.8
NVD Vector: 🔍
CNA Base Score: 5.8
CNA Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cryptographic issuesCWE: CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
Timeline
11/27/2017 🔍05/02/2018 🔍
05/02/2018 🔍
05/02/2018 🔍
05/02/2018 🔍
05/03/2018 🔍
11/26/2024 🔍
Sources
Vendor: cisco.comAdvisory: cisco-sa-20180502-fpwr-codp
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2018-0283 (🔍)
SecurityFocus: 104121 - Cisco Firepower System Software CVE-2018-0283 Denial of Service Vulnerability
See also: 🔍
Entry
Created: 05/03/2018 08:35 AMUpdated: 11/26/2024 09:00 PM
Changes: 05/03/2018 08:35 AM (61), 02/02/2020 08:06 AM (4), 11/26/2024 09:00 PM (28)
Complete: 🔍
Cache ID: 18:8B9:40
No comments yet. Languages: en.
Please log in to comment.