Cisco Firepower Threat Defense Software TCP Proxy DoS (cisco-sa-ftd-tcp-dos-kM9SHhOu)

high Nessus Plugin ID 161002

Synopsis

The remote device is missing a vendor-supplied security patch

Description

A vulnerability in the TCP proxy functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper handling of TCP flows. An attacker could exploit this vulnerability by sending a crafted stream of TCP traffic through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

Please see the included Cisco BID and Cisco Security Advisory for more information.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvz00032

See Also

http://www.nessus.org/u?05fc200a

Plugin Details

Severity: High

ID: 161002

File Name: cisco-sa-ftd-tcp-dos-kM9SHhOu.nasl

Version: 1.8

Type: local

Family: CISCO

Published: 5/11/2022

Updated: 11/21/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2022-20746

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:firepower_threat_defense

Required KB Items: installed_sw/Cisco Firepower Threat Defense

Exploit Ease: No known exploits are available

Patch Publication Date: 4/27/2022

Vulnerability Publication Date: 4/27/2022

Reference Information

CVE: CVE-2022-20746

CWE: 476

CISCO-SA: cisco-sa-ftd-tcp-dos-kM9SHhOu

IAVA: 2022-A-0184-S

CISCO-BUG-ID: CSCvz00032