mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
523 lines
16 KiB
JSON
523 lines
16 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2020-3254",
|
||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||
|
"published": "2020-05-06T17:15:12.603",
|
||
|
"lastModified": "2020-05-12T18:07:01.320",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Multiple vulnerabilities in the Media Gateway Control Protocol (MGCP) inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerabilities are due to inefficient memory management. An attacker could exploit these vulnerabilities by sending crafted MGCP packets through an affected device. An exploit could allow the attacker to cause memory exhaustion resulting in a restart of an affected device, causing a DoS condition for traffic traversing the device."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "M\u00faltiples vulnerabilidades en la funcionalidad de inspecci\u00f3n de Media Gateway Control Protocol (MGCP) del Cisco Adaptive Security Appliance (ASA) Software y el Firepower Threat Defense (FTD) Software, podr\u00edan permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sobre un dispositivo afectado. Las vulnerabilidades son debido a una administraci\u00f3n ineficiente de la memoria. Un atacante podr\u00eda explotar estas vulnerabilidades mediante el env\u00edo de paquetes MGCP dise\u00f1ados a trav\u00e9s de un dispositivo afectado. Una explotaci\u00f3n podr\u00eda permitir a un atacante causar el agotamiento de la memoria, resultando en un reinicio de un dispositivo afectado, causando una condici\u00f3n DoS para el tr\u00e1fico que atraviesa el dispositivo."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 7.5,
|
||
|
"baseSeverity": "HIGH"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 3.6
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV30": [
|
||
|
{
|
||
|
"source": "ykramarz@cisco.com",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.0",
|
||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "CHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 8.6,
|
||
|
"baseSeverity": "HIGH"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 4.0
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 7.8
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 6.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-400"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"source": "ykramarz@cisco.com",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-400"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.2.3",
|
||
|
"versionEndExcluding": "6.2.3.16",
|
||
|
"matchCriteriaId": "C4B2E5D3-ED34-4A7E-BD8F-8492B6737677"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.3.0",
|
||
|
"versionEndExcluding": "6.3.0.6",
|
||
|
"matchCriteriaId": "9D27DE97-510A-4761-8184-6940745B54E2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.4.0",
|
||
|
"versionEndExcluding": "6.4.0.4",
|
||
|
"matchCriteriaId": "17D8647E-1FA8-486E-B150-1EEFE52C31BB"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DEC2BDDE-4CBD-43C8-BFD9-DD2BE6A20E91"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5510_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FC8EC7CF-6207-4A2E-89CE-13A0B2E4BC36"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B091B9BA-D4CA-435B-8D66-602B45F0E0BD"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1B2408C9-AAE7-48D2-ACEC-1BEE95AC95F9"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "08F0F160-DAD2-48D4-B7B2-4818B2526F35"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "EAB0DFDC-3111-44BE-ADCC-4F3B984AADB2"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "977D597B-F6DE-4438-AB02-06BE64D71EBE"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5520_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B94CB6D9-39AA-4EA6-AC1E-2A2B26828AC7"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "2B387F62-6341-434D-903F-9B72E7F84ECB"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BEF25129-A5FE-4B05-BE69-F3D35F7A9F7C"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "EB71EB29-0115-4307-A9F7-262394FD9FB0"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5540_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C4AD2A96-FF85-4BFD-8B3E-AD2D5D51A6CA"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "17C5A524-E1D9-480F-B655-0680AA5BF720"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DF9159BA-CBE1-43F4-864C-3CF0B8AE8260"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "57179F60-E330-4FF0-9664-B1E4637FF210"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5550_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9FB38210-78F2-4414-A4A5-E885F3C9057B"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E6287D95-F564-44B7-A0F9-91396D7C2C4E"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E7F69272-B20B-4467-AA04-3C47AF2C1F58"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5535C936-391B-4619-AA03-B35265FC15D7"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "63EB7842-7311-4868-906C-13173E6F0149"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D1E828B8-5ECC-4A09-B2AD-DEDC558713DE"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:9.10\\(1.3\\):*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "37C822CE-5DCB-4E71-8876-CCC5DC664DAD"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "16AE20C2-C77E-4E04-BF13-A48696E52426"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "9.6",
|
||
|
"versionEndExcluding": "9.6.4.34",
|
||
|
"matchCriteriaId": "684F96BD-05A8-4FBC-B060-54258C52ED28"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "9.8",
|
||
|
"versionEndExcluding": "9.8.4.7",
|
||
|
"matchCriteriaId": "F9CF1EFA-FAA8-4A4B-9DED-5369A749BB8D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "9.9",
|
||
|
"versionEndExcluding": "9.9.2.66",
|
||
|
"matchCriteriaId": "F92A8E43-CD31-4E33-ADE2-94ABC8B49551"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "9.10",
|
||
|
"versionEndExcluding": "9.10.1.27",
|
||
|
"matchCriteriaId": "D430C4AA-E40A-455B-BD8B-9F04ADCD4186"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "9.12",
|
||
|
"versionEndExcluding": "9.12.2.1",
|
||
|
"matchCriteriaId": "1FA7882A-1109-4F78-9F09-38777DA02307"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-mgcp-SUqB8VKH",
|
||
|
"source": "ykramarz@cisco.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|