2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-3283" ,
2025-01-26 03:03:52 +00:00
"sourceIdentifier" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2020-05-06T17:15:12.837" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T05:30:43.263" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) handler of Cisco Firepower Threat Defense (FTD) Software when running on the Cisco Firepower 1000 Series platform could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to a communication error between internal functions. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause a buffer underrun, which leads to a crash. The crash causes the affected device to reload."
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad en el manejador de Secure Sockets Layer (SSL)/Transport Layer Security (TLS) del Cisco Firepower Threat Defense (FTD) Software cuando se ejecuta en la plataforma Cisco Firepower 1000 Series, podr\u00eda permitir a un atacante remoto no autenticado desencadenar una denegaci\u00f3n de servicio ( DoS) sobre un dispositivo afectado. La vulnerabilidad es debido a un error de comunicaci\u00f3n entre funciones internas. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un mensaje SSL/TLS dise\u00f1ado hacia un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante causar una subdesbordamiento del b\u00fafer, que conlleva a un bloqueo. El bloqueo causa que el dispositivo afectado se sobrecargue."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.0
}
] ,
"cvssMetricV30" : [
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.0
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-11-23 13:10:58 +00:00
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
2024-11-23 13:10:58 +00:00
"value" : "CWE-119"
2023-04-24 12:24:31 +02:00
}
]
} ,
{
2024-11-23 13:10:58 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
2024-11-23 13:10:58 +00:00
"value" : "CWE-787"
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.4.0" ,
"versionEndExcluding" : "6.4.0.9" ,
"matchCriteriaId" : "06741056-2BFD-4F88-917A-F581F813B69E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7FFE3880-4B85-4E23-9836-70875D5109F7"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:firepower_1020:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA8B5AF8-6A57-482A-9442-E857EE7E207B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:firepower_1030:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A9929280-2AAC-4B56-A42C-1F6EDE83988E"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:firepower_1040:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F29B6BC3-D716-4A3D-9679-B7BE81F719C8"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5505_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D0B3813-F3A0-4513-828B-7990F899DA48"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5505_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AAEA9C9F-F72A-4265-A5F6-A9D9A541991C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5510_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58E04E88-F836-4220-9961-C46D5AF2285F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5510_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD25D50A-C319-453A-8690-38747CC061E5"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B091B9BA-D4CA-435B-8D66-602B45F0E0BD"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5512-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "83524681-0B3A-492A-BBA5-1E905529EEF0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5512-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ED129635-7BB2-43FC-9FE9-C269E9D30BC4"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "08F0F160-DAD2-48D4-B7B2-4818B2526F35"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5515-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A289F236-9D8D-4E6D-9E48-FD62E6AA5A2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5515-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5DADAFCF-C950-4B8D-B88A-A446D1DA3635"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "977D597B-F6DE-4438-AB02-06BE64D71EBE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5520_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "10409979-E312-48FA-B690-4851C602652A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5520_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "65FE5EA5-1AD2-4FA6-9D3A-D21CDB7DA037"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2B387F62-6341-434D-903F-9B72E7F84ECB"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5525-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E517D3B-C730-4CD8-B15A-10151D81A1DF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5525-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB3A269B-1C99-4D54-810A-389AF6F2B717"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB71EB29-0115-4307-A9F7-262394FD9FB0"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5540_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2F4D4E6-E1AD-4B07-8DDF-B57C2A0EDC65"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5540_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "50AAD56A-2238-4A94-A4E6-15DB26751EBC"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17C5A524-E1D9-480F-B655-0680AA5BF720"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5545-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58E83502-8147-4B06-93E6-506154C7F120"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5545-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F33C4821-430E-4962-8A1A-4E5353303507"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "57179F60-E330-4FF0-9664-B1E4637FF210"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5550_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C953E75-EA5F-4FA5-927B-1F7E431B9C86"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5550_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB1467EB-0AFB-4792-8DB8-9F134FA1529D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E6287D95-F564-44B7-A0F9-91396D7C2C4E"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5555-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7126BDC6-13A8-4ABB-824B-DE71C73095CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5555-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D0DBF19E-F275-461E-9BD2-EA8645289407"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5535C936-391B-4619-AA03-B35265FC15D7"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5580_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "188196CB-F5AE-4A6F-ABF6-3BF8CF43485D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5580_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "44ABBDC4-BB79-41F5-8BF9-46779098DE91"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D1E828B8-5ECC-4A09-B2AD-DEDC558713DE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5585-x_firmware:9.12\\(2.12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D7DEA476-508E-4354-9602-56D305A85A0C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5585-x_firmware:9.13\\(0.33\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "062210FE-2A86-478F-90B1-DDEAE35639B9"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "16AE20C2-C77E-4E04-BF13-A48696E52426"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-4v5nmWtZ" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Vendor Advisory"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-4v5nmWtZ" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}