Type Firewall Software

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Vendor »

Identifying all affected vendors is a good starting point for an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Product »

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector »

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication »

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction »

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index »

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume »

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities »

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Products (459): 3proxy, 2345 Security Guard, A10 ACOS Web Application Firewall, acFreeProxy, Agnitum Outpost Firewall, AlgoSec Firewall Analyzer, all-in-one-wp-security-and-firewall Plugin, All In One WP Security , AnalogX Proxy, Anon Proxy Server, apt-www-proxy, Armorlogic Profense Web Application Firewall, Artica Proxy, Artica Proxy CE, Artica Web Proxy, Astaro Firewall, at32 Reverse Proxy, AtGuard Personal Firewall, Avsoft Kerio WinRoute Firewall, Axent Raptor Firewall, Banu Tinyproxy, Barracuda Firewall, Barracuda IMFirewall, Barracuda Spam, Barracuda Spam Firewall, Barracuda Virus Firewall, Barracuda Web Application Firewall, Barracuda Web Firewall, Barracudanetworks Spam , Barracudanetworks Virus Firewall, Barracuda Networks Barracuda Spam Firewall, Bitly oauth2_proxy, Bluecoat ProxyAV, Bluecoat ProxyClient, Bluecoat Proxysgos, Bluecoat Webproxy, BlueCoat Webproxy, Bluecoat WinProxy, Blue Coat Advanced Secure Gateway, Blue Coat CacheFlow, Blue Coat ProxySG, Borderware Firewall Server, Broadcom ASG, Broadcom ProxySG, Bsdperimeter pfSense, BSD Perimeter pfSense, Buzzscripts BuzzyWall, BuzzyWall, C-Note Squid Auth LDAP, CA Personal Firewall, Cerbere Proxy Server, Charles Proxy, Check Point Endpoint Security Client, Check Point Firewall, Check Point Firewall-1, Check point Firewall-1, Check Point Firewall-1 NG, Check Point Firewall-1 PKI Web Service, Check Point FireWall-1 VSX NG, Check point VPN-1, Check Point VPN-1, Check Point ZoneAlarm, check point zonealarm, Check Point ZoneAlarm Extreme Security, Check Point Software Firewall-1, Cisco AMP, Cisco AnyConnect Secure Mobility Client, Cisco ASA, Cisco ASA-CX, Cisco ASA-CX Content-Aware Security, Cisco ASAv, Cisco ASA 1000V, Cisco Asa 1000v Cloud Firewall, Cisco ASA 5500, Cisco ASA 5580, Cisco ASA CX, Cisco ASA CX Context-Aware Security, Cisco ASA NGFW, Cisco ASA Software, Cisco Cisco RV130W Wireless-N Multifunction VPN Router, Cisco Cisco RV215W Wireless-N VPN Router, Cisco FirePOWER, Cisco Firepower 2100, Cisco Firepower 4100, Cisco Firepower 9000, Cisco Firepower 9300, Cisco Firepower Device Manager On-Box, Cisco Firepower Extensible Operating System, Cisco Firepower Management Center, Cisco FirePOWER Management Center, Cisco Firepower Management Center Software, Cisco FirePOWER Services Software for ASA, Cisco Firepower System Software, Cisco Firepower Threat Defense, Cisco Firepower Threat Defense Software, Cisco Firepower User Agent, Cisco Firepower User Agent Software, Cisco FireSIGHT, Cisco FireSIGHT System Software, Cisco Firewall, Cisco Firewall Services Module, Cisco Firewall Services Module Software, Cisco FXOS, Cisco Industrial Security Appliance, Cisco Integrated Services Router, Cisco Integrated Services Virtual Router, Cisco Meraki MX Security Appliance, Cisco NX-OS, Cisco PIX, Cisco PIX 500, Cisco Pix 500, Cisco Pix Asa Finesse Operation System, Cisco Pix Firewall, Cisco Pix Firewall 520, Cisco PIX Firewall Manager, Cisco PIX Private Link, Cisco Prime Security Manager, Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, Cisco RV215W Wireless-N VPN Router, Cisco Services Router 1000V, Clavister Eagle E7, Comodo Firewall Pro, Comodo Personal Firewall, Comodo UTM Firewall, Computalynx CProxy, Computalynx CProxy Server, ConfigServer Configserver Security Firewall, CSM Proxy, CUJO Smart Firewall, Daniel Mealha Cabrita Ziproxy, Darold squidclamav, Darold SquidClamav, Delegate Proxy, DELL SonicWALL, Dell SonicWall, Dell SonicWALL GMS, Dell SonicWall GMS Virtual Appliance, Dell SonicWALL NetExtender, Dell Sonicwall Network Security Appliance 2400, Dell SonicWall Scrutinizer, Dell SonicWALL Scrutinizer, Dell Sonicwall Scrutinizer With Flow Analytics Module, Dell SonicWall TotalSecure TZ 100, Dell Sonicwall Universal Management Appliance E5000, Dell SonicWall ViewPoint, Dell UMA, Dell ViewPoint, Deny All Firewall Plugin, dircproxy, dproxy, Endian Firewall, Endian UTM Firewall, ESET Personal Firewall NDIS filter, F5 BIG-IP, F5 BIG-IP AAM, F5 BIG-IP Advanced WAF, F5 BIG-IP AFM, F5 BIG-IP Analytics, F5 BIG-IP APM, F5 BIG-IP APM Client, F5 BIG-IP APM Edge Client, F5 BIG-IP Application Acceleration Manager, F5 BIG-IP Application Security Manager, F5 BIG-IP ASM, F5 BIG-IP Configuration utility, F5 BIG-IP Controller for Kubernetes, F5 BIG-IP DNS, F5 BIG-IP Edge Client, F5 BIG-IP FPS, F5 BIG-IP LTM, F5 BIG-IP Manager, F5 BIG-IP PEM, F5 Big-IP Protocol Security Manager, F5 Big-ip Protocol Security Module, F5 BIG-IP Virtual Edition, F5 BIG-IP Virtual Server, F5 BIG-IQ, F5 BIG-IQ Centralized Management, F5 BIG-IQ Cloud, F5 Edge Gateway, F5 Enterprise Manager, F5 FirePass, F5 Firepass, F5 iWorkflow, F5 Orchestration, Firewall, Firewallbuilder fwbuilder, firewalld, Fortech Proxy+, Fortinet FortiGate, Fortinet Fortigate FortiDB, Fortinet Fortinet firewall, Fortinet FortiOS, Fotinet FortiOS, FreeProxy, freeradius3 for pfSense, FreeWeb, Funk Software Proxy, Fwbuilder Firewall Builder, Gaim HTTP Proxy, Gibraltar Gibraltar Firewall, GIPTables GIPTables Firewall, gomeplus-h5-proxy, GreenSQL GreenSQL Firewall, Grok Developments NetProxy, HAProxy, HAProxy Package, HP Praesidium Webproxy, http-proxy.js, Http-proxy, https-proxy-agent, Huawei Honor Cube Wireless Router WS860s Firewall, IBM AIX eNetwork Firewall, IBM AS400 Firewall, IBM Sametime Proxy Server, IBM Secureway Firewall, Igor Khasilev Oops Proxy Server, Imap Proxy, Imperva SecureSphere Web Application Firewall, InGate Firewall, ingate firewall, Ingate Firewall, InGate SIParator, Initial Redirect Initial Redirect Squid Proxy Plug-in, Interactive Intelligence Interaction SIP Proxy, Internetnow Proxynow, IPCop Firewall, IPFire Firewall, jc21 Nginx Proxy Manager, Juniper NetScreen 5GT Firewall, Kerio Personal Firewall, kerio personal firewall, Kerio WinRoute Firewall, Kerio Winroute Firewall, KingSoft Personal Firewall 9, kube-rbac-proxy, libproxy, Ln-lab WebProxy, Looknstop Look 'n' Stop Firewall, MapProxy, mastercactapus proxyprotocol, McAfee Client Proxy, McAfee Firewall Reporter, McAfee Personal Firewall Plus, McAfee Unified Threat Management Firewall, McAfee UTM Firewall Appliance, McAfee Web Gateway, Microsoft ISA Proxy, Microsoft ISA Server, Microsoft Personal Firewall, Microsoft Proxy Server, Microsoft Web Proxy, mitmproxy, Multi-Tech Proxyserver, myproxy, Myproxy, My Firewall Plus, my firewall plus, National Science Foundation Squid, National Science Foundation Squid Web Proxy, National Science Foundation Squid Web Proxy Cache, NCSA MyProxy, NetApp SANtricity Storage Manager, NetApp SANtricity Web Services Proxy, NetAsq IPS-Firewall, Netgate pfSense, Netgear ProSafe VPN Firewall, Network Associates Gauntlet Firewall, Nokia Firewall Appliance, Nokia IPSO, Nokia IPSO Voyager, Nortel Switched Firewall, Novell Client Firewall, NuFW Firewall, OAuth2 Proxy, Office Efficiencies SafeSquid, Online Armor Personal Firewall, OPNsense, Oracle iPlanet Web Proxy Server, Oracle Sun Java System Web Proxy Server, Oracle Sun Microsystems SunScreen Firewall, Palo Alto Firewall, Palo Alto PAN-OS, PAN-OS, ParosProxy, PC Tools Firewall, Pexip Reverse Proxy, Pexip TURN Server, pfsense, pfSense, pfSense Firewall, pfSense Snort package, pfSense Suricata package, phion airlock Web Application Firewall, PHP-Proxy, PHProxy, phpSquidPass, PHP Proxy, Privacyware Privatefirewall, ProofPoint Protection Server Email Firewall, Proxomitron Proxy Server, proxy.js, Proxy, Proxy-pro Professional Gatekeeper, ProxyChains-NG, Proxygen, Proxyman, proxystatistics Module, Proxytunnel, proxytunnel, Proxy Anket, PSI GridConnect GmbH IEC104 Security Proxy, PSI GridConnect GmbH Smart Telecontrol Unit, PSI GridConnect GmbH Smart Telecontrol Unit TCG, PSI GridConnect GmbH Telecontrol Gateway, PSI GridConnect GmbH Telecontrol Gateway 3G, PSI GridConnect GmbH Telecontrol Gateway VM, PSI GridConnect GmbH Telecontrol Gateway XS-MU, PSOProxy Server, Pwicorp PrivateFirewall, Qbik WinGate Proxy, QNAP Proxy Server, RealNetworks RealSystem Proxy, RealNetworks RealSystem Server, Red Hat system-config-firewall, Replicom Proxyview, Reverse Proxy Auth Plugin, rhn-proxy, RTPproxy, rWeb HTTP Proxy, Safenet Authentication Service TokenValidator Proxy Agent, SAP Sybase Unwired Platform Online Data Proxy, SapporoWorks WinProxy, sDNSProxy.exe, Shanghai 2345 Security Guard, Sidewinder G2 Firewall, simpleproxy, smtp.proxy, Snapgear Lite+ Firewall, SOCKS 4 Proxy, SOCKS 5 Proxy, Softsphere DefenseWall Personal Firewall, Solarwinds Firewall Security Manager, SonicWall, SonicWALL Analyzer, SonicWALL AntiSpam , SonicWALL Aventail Sra Ex7000, SonicWALL Continuous Data Protection, SonicWall E-mail Security, SonicWALL Firewall, SonicWALL Global Management System, SonicWALL Global VPN Client, SonicWALL GMS, SonicWALL installer Activex Control, SonicWALL NetExtender, SonicWALL NSA, SonicWALL Pro, SonicWALL Scrutinizer, SonicWALL Scrutinizer Dashboard, SonicWALL SMA100, SonicWALL SMA1000, SonicWALL SOHO, SonicWALL SOHO3, SonicWALL SOHO Firewall, SonicWALL SonicOS, SonicWALL SonicOSv, SonicWALL SSL-VPN End-Point Interrogator, SonicWALL SSL-VPN VirtualOffice, SonicWALL SSL VPN, SonicWall SSL VPN, SonicWall Ssl Vpn 200, SonicWALL Tele2, SonicWALL UMA E5000, SonicWALL Viewpoint, SonicWALL ViewPoint, SonicWALL EMail, Sophos Cloud Optix, Sophos Cyberoam Firewall, Sophos EAS Proxy, Sophos Endpoint Protection, Sophos Intercept X Endpoint, Sophos Intercept X for Server, Sophos Mobile, Sophos Secure Web Gateway., Sophos Secure Web Gateway Server, Sophos Web Appliance Remote, Sophos XG Firewall, Squid HTTP Proxy, Squid proxy, Squid Proxy, Squid Web Proxy, squidGuard, Stage File Proxy, StoneSoft Firewall Engine, StoneSoft StoneGate Firewall, StreamAudio Chaincast Proxymanager Activex Control, Sun Java System Web Proxy Server, SuSEfirewall2, Symantec Advanced Secure Gateway, Symantec ASG, Symantec CacheFlow, Symantec Enterprise Firewall, Symantec Firewall, Symantec Norton Personal Firewall, Symantec ProxyClient, Symantec ProxySG, Symantec Raptor Firewall, Symantec Sygate Personal Firewall, Symantec VPN, Symantec VPN Appliance, Symantec VPN Appliances, Symantec Web Gateway, Tallemu Personal Firewall, Tiny Personal Firewall, Tinyproxy, TIS Firewall Toolkit, TIS Internet Firewall Toolkit, Tor Proxy, Trustwave Secure Web Gateway, Tumbleweed Email Firewall, Tumbleweed MailGate Email Firewall, Tumbleweed Mailgate Email Firewall, Uiga Proxy, Uninett radsecproxy, Untangle Firewall NG, Untangle NG Firewall, up-imapproxy, Vergenet Perdition Mail Retrieval Proxy, Watchguard Firewall, WatchGuard SOHO Firewall, webdesproxy, Webproxy, webroot desktop firewall, Webroot Desktop Firewall, WinGate Proxy, YoungZSoft CCProxy, Ziproxy, ZoneAlarm, ZoneAlarm Anti-Ransomware, ZoneAlarm Antivirus, ZoneAlarm Firewall, ZoneLabs ZoneAlarm, ZoneLabs Zonealarm Security Suite, ZyWALL, ZyXEL ATP500, ZyXEL UAG, ZyXEL USG, ZyXEL USG40, ZyXEL USG1900, ZyXEL ZyWall, ZyXEL ZyWALL, ZyXEL ZyWALL310, ZyXEL ZyWALL1100, Zyxel Zywall 2, ZyXEL ZyWALL 10, ZyXEL ZyWALL 100, ZyXEL ZyWALL USG, Firewall Plugin

PublishedBaseTempVulnerabilityProdExpRemCTICVE
11/19/20205.65.6F5 BIG-IP/BIG-IP Virtual Edition TCP Sequence Number random valuesBIG-IP/BIG-IP Virtual EditionNot DefinedOfficial Fix0.32CVE-2020-5947
11/13/20203.53.4Untangle Firewall NG unknown vulnerabilityFirewall NGNot DefinedOfficial Fix0.13CVE-2020-17494
11/12/20207.37.0Palo Alto PAN-OS GlobalProtect Gateway improper authorizationPAN-OSNot DefinedOfficial Fix0.07CVE-2020-2050
11/12/20203.33.2Palo Alto PAN-OS Log File log filePAN-OSNot DefinedOfficial Fix0.03CVE-2020-2048
11/12/20203.73.6Palo Alto PAN-OS Panorama Software information disclosurePAN-OSNot DefinedOfficial Fix0.04CVE-2020-2022
11/12/20207.26.9Palo Alto PAN-OS Management Web Interface os command injectionPAN-OSNot DefinedOfficial Fix0.07CVE-2020-2000
11/12/20205.35.1Palo Alto PAN-OS Signature-Based Threat Detection Engine improper check for unusual conditionsPAN-OSNot DefinedOfficial Fix0.07CVE-2020-1999
11/06/20203.53.4F5 BIG-IP Advanced WAF/BIG-IP FPS Traffic Management Microkernel denial of serviceBIG-IP Advanced WAF/BIG-IP FPSNot DefinedOfficial Fix0.05CVE-2020-5946
11/06/20204.74.5F5 BIG-IP TMUI Page cross site scriptingBIG-IPNot DefinedOfficial Fix0.07CVE-2020-5945
11/06/20206.36.0F5 BIG-IP REST Interface access controlBIG-IPNot DefinedOfficial Fix0.05CVE-2020-5943
11/06/20205.75.5F5 BIG-IP PEM Traffic Management Microkernel denial of serviceBIG-IP PEMNot DefinedOfficial Fix0.06CVE-2020-5942
11/06/20205.75.5F5 BIG-IP Traffic Management Microkernel lookup denial of serviceBIG-IPNot DefinedOfficial Fix0.06CVE-2020-5941
11/06/20203.53.4F5 BIG-IP Configuration utility Traffic Management User Interface cross site scriptingBIG-IP Configuration utilityNot DefinedOfficial Fix0.06CVE-2020-5940
11/06/20203.53.4F5 BIG-IP Virtual Edition Traffic Management Microkernel O denial of serviceBIG-IP Virtual EditionNot DefinedOfficial Fix0.05CVE-2020-5939
10/30/20203.73.6F5 BIG-IP IPSec Tunnel inadequate encryptionBIG-IPNot DefinedOfficial Fix0.11CVE-2020-5938
10/30/20203.53.4F5 BIG-IP AFM Traffic Management Microkernel denial of serviceBIG-IP AFMNot DefinedOfficial Fix0.11CVE-2020-5937
10/30/20203.53.4F5 BIG-IP MQTT Traffic denial of serviceBIG-IPNot DefinedOfficial Fix0.06CVE-2020-5935
10/30/20203.53.4F5 BIG-IP APM SLO URL denial of serviceBIG-IP APMNot DefinedOfficial Fix0.05CVE-2020-5934
10/30/20203.53.4F5 BIG-IP HTTP Compression resource consumptionBIG-IPNot DefinedOfficial Fix0.06CVE-2020-5933
10/30/20203.53.4F5 BIG-IP ASM Configuration Utility cross site scriptingBIG-IP ASMNot DefinedOfficial Fix0.07CVE-2020-5932
10/30/20203.53.4F5 BIG-IP OneConnect Profile resource consumptionBIG-IPNot DefinedOfficial Fix0.06CVE-2020-5931
10/28/20206.36.3SonicWALL Global VPN Client Library uncontrolled search pathGlobal VPN ClientNot DefinedNot Defined0.15CVE-2020-5145
10/28/20207.87.5SonicWALL Global VPN Client untrusted search pathGlobal VPN ClientNot DefinedNot Defined0.15CVE-2020-5144
10/27/20206.36.0Check Point ZoneAlarm Anti-Ransomware untrusted search pathZoneAlarmNot DefinedOfficial Fix0.09CVE-2020-6023
10/27/20204.44.2Check Point ZoneAlarm Anti-Ransomware permissionZoneAlarmNot DefinedOfficial Fix0.06CVE-2020-6022
10/23/20205.24.9Cisco ASA Web-based Management Interface cross site scriptingASANot DefinedOfficial Fix0.52CVE-2020-3599
10/23/20204.54.4Cisco ASA/Firepower Threat Defense TLS Connection information exposureASA/Firepower Threat DefenseNot DefinedOfficial Fix0.79CVE-2020-3585
10/23/20205.24.9Cisco ASA/Firepower Threat Defense Web Services Interface cross site scriptingASA/Firepower Threat DefenseNot DefinedOfficial Fix0.72CVE-2020-3583
10/23/20205.24.9Cisco ASA/Firepower Threat Defense Web Services Interface cross site scriptingASA/Firepower Threat DefenseNot DefinedOfficial Fix0.46CVE-2020-3582
10/23/20205.24.9Cisco ASA/Firepower Threat Defense Web Services Interface cross site scriptingASA/Firepower Threat DefenseNot DefinedOfficial Fix0.46CVE-2020-3581
10/23/20205.24.9Cisco ASA/Firepower Threat Defense Web Services Interface cross site scriptingASA/Firepower Threat DefenseNot DefinedOfficial Fix0.46CVE-2020-3580
10/23/20205.95.6Cisco ASA/Firepower Threat Defense Web Services Interface authorizationASA/Firepower Threat DefenseNot DefinedOfficial Fix0.52CVE-2020-3578
10/23/20206.96.6Cisco Firepower Threat Defense denial of serviceFirepower Threat DefenseNot DefinedOfficial Fix1.41CVE-2020-3577
10/23/20208.07.7Cisco ASA/Firepower Threat Defense TLS Connection resource consumptionASA/Firepower Threat DefenseNot DefinedOfficial Fix0.72CVE-2020-3572
10/23/20208.07.7Cisco Firepower Threat Defense ICMPv6 Packet resource consumptionFirepower Threat DefenseNot DefinedOfficial Fix1.76CVE-2020-3571
10/23/20205.55.3Cisco Firepower Threat Defense TCP Interception access controlFirepower Threat DefenseNot DefinedOfficial Fix0.52CVE-2020-3565
10/23/20205.35.1Cisco ASA/Firepower Threat Defense FTP Inspection Engine access controlASA/Firepower Threat DefenseNot DefinedOfficial Fix0.52CVE-2020-3564
10/23/20208.07.7Cisco Firepower Threat Defense TCP Packet denial of serviceFirepower Threat DefenseNot DefinedOfficial Fix1.53CVE-2020-3563
10/23/20208.07.7Cisco Firepower Threat Defense TLS inspection memory corruptionFirepower Threat DefenseNot DefinedOfficial Fix1.30CVE-2020-3562
10/23/20204.74.5Cisco ASA/Firepower Threat Defense Clientless SSL VPN crlf injectionASA/Firepower Threat DefenseNot DefinedOfficial Fix0.72CVE-2020-3561
10/23/20206.25.9Cisco FirePOWER Management Center Web-based Management Interface redirectFirePOWER Management CenterNot DefinedOfficial Fix2.15CVE-2020-3558
10/23/20205.35.1Cisco FirePOWER Management Center API Daemon certificate validationFirePOWER Management CenterNot DefinedOfficial Fix1.98CVE-2020-3557
10/23/20206.76.4Cisco ASA/Firepower Threat Defense SIP Inspection denial of serviceASA/Firepower Threat DefenseNot DefinedOfficial Fix0.52CVE-2020-3555
10/23/20207.57.2Cisco ASA/Firepower Threat Defense TCP Packet resource consumptionASA/Firepower Threat DefenseNot DefinedOfficial Fix1.82CVE-2020-3554
10/23/20204.24.0Cisco FirePOWER Management Center Web-based Management Interface cross site scriptingFirePOWER Management CenterNot DefinedOfficial Fix0.77CVE-2020-3553
10/23/20207.26.8Cisco FirePOWER Management Center sfmgr Daemon path traversalFirePOWER Management Center/Firepower Threat DefenseNot DefinedOfficial Fix1.95CVE-2020-3550
10/23/20205.95.6Cisco FirePOWER Management Center sftunnel inadequate encryptionFirePOWER Management Center/Firepower Threat DefenseNot DefinedOfficial Fix0.45CVE-2020-3549
10/23/20208.17.7Cisco Firepower Threat Defense SNMP resource consumptionFirepower Threat DefenseNot DefinedNot Defined1.99CVE-2020-3533
10/23/20208.17.7Cisco ASA/Firepower Threat Defense SSL VPN Negotiation resource consumptionASA/Firepower Threat DefenseNot DefinedOfficial Fix1.60CVE-2020-3529
10/23/20208.17.7Cisco ASA/Firepower Threat Defense OSPFv2 Packet denial of serviceASA/Firepower Threat DefenseNot DefinedOfficial Fix0.56CVE-2020-3528

Want to stay up to date on a daily basis?

Enable the mail alert feature now!