mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-12 02:04:49 +00:00
663 lines
22 KiB
JSON
663 lines
22 KiB
JSON
{
|
|
"id": "CVE-2020-3196",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2020-05-06T17:15:12.417",
|
|
"lastModified": "2024-11-21T05:30:31.633",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) handler of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to exhaust memory resources on the affected device, leading to a denial of service (DoS) condition. The vulnerability is due to improper resource management for inbound SSL/TLS connections. An attacker could exploit this vulnerability by establishing multiple SSL/TLS connections with specific conditions to the affected device. A successful exploit could allow the attacker to exhaust the memory on the affected device, causing the device to stop accepting new SSL/TLS connections and resulting in a DoS condition for services on the device that process SSL/TLS traffic. Manual intervention is required to recover an affected device."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en el manejador de Secure Sockets Layer (SSL)/Transport Layer Security (TLS) del Cisco Adaptive Security Appliance (ASA) Software y el Cisco Firepower Threat Defense (FTD) Software, podr\u00eda permitir a un atacante remoto no autenticado agotar los recursos de la memoria sobre el dispositivo afectado, conllevando a una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad es debido a una administraci\u00f3n de recursos inapropiada para las conexiones entrantes SSL/TLS. Un atacante podr\u00eda explotar esta vulnerabilidad al establecer m\u00faltiples conexiones SSL/TLS con condiciones espec\u00edficas para el dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante agotar la memoria en el dispositivo afectado, causando que el dispositivo deje de aceptar nuevas conexiones SSL/TLS y resultando en una condici\u00f3n DoS para los servicios en el dispositivo que procesa el tr\u00e1fico SSL/TLS. Es requerida una intervenci\u00f3n manual para recuperar un dispositivo afectado."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
|
"baseScore": 8.6,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 4.0
|
|
}
|
|
],
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
|
"baseScore": 8.6,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 4.0
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-400"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-400"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.2.3",
|
|
"versionEndExcluding": "6.2.3.16",
|
|
"matchCriteriaId": "C4B2E5D3-ED34-4A7E-BD8F-8492B6737677"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.3.0",
|
|
"versionEndExcluding": "6.3.0.6",
|
|
"matchCriteriaId": "9D27DE97-510A-4761-8184-6940745B54E2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.4.0",
|
|
"versionEndExcluding": "6.4.0.9",
|
|
"matchCriteriaId": "06741056-2BFD-4F88-917A-F581F813B69E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.5.0",
|
|
"versionEndExcluding": "6.5.0.5",
|
|
"matchCriteriaId": "3ED0E59C-146C-494F-AD46-F6FB43F9C575"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5221CFEE-6FBF-44E4-8DB1-592BE809E4B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A093039-37B1-4EAE-9905-85916BEBF5B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C36ED08-6819-4BC4-9BDB-FD490CED1877"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5510_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E9CBD3A-F426-4E13-BAAB-1AE1ED7400E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5510_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DE2C0163-BBB7-45AD-8F4E-FA929FC15008"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5510_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC5BE91D-FF59-42CC-BF9B-8C019ACDA3E9"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B091B9BA-D4CA-435B-8D66-602B45F0E0BD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33D660B9-A5B8-497D-8820-24ED84E93CE6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7931908-4F0B-47E0-AA9F-0D6C58B58607"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1F6AE2D7-5B7B-4883-93D1-4A3232761E16"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08F0F160-DAD2-48D4-B7B2-4818B2526F35"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09DB9B53-5F40-4262-8520-23827593FA75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8990E7B1-E256-48DC-A91D-E7A369CA140B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1B82BE6-AD49-4EC9-A4CE-6F56EF123BF8"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "977D597B-F6DE-4438-AB02-06BE64D71EBE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5520_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "993BCB8D-6F0A-40FE-BB35-6721C4AF51B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5520_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3CDF3D71-3674-483A-A860-CB908FEAF38B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5520_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11BBB96D-3921-4DC4-9A05-0CCF2F9D48F0"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B387F62-6341-434D-903F-9B72E7F84ECB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32970E7C-89EB-49AB-8397-D44D59047940"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8EC08D0-0A8F-4846-83B1-5059D8B270F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64B3A25A-48EA-440B-BFA9-F90316C93396"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB71EB29-0115-4307-A9F7-262394FD9FB0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5540_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6CA91C35-A8BE-4766-B4B4-86B185F16467"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5540_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CC09B403-0051-441A-A3D3-B790DD60F7F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5540_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "393228AB-D0BC-41AC-92E7-40F7E0399BDD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17C5A524-E1D9-480F-B655-0680AA5BF720"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B63F6AD6-6084-427B-8530-C2FDABCAD1D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5536B015-5F7E-4CB4-B11B-CDA0DB9879AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7175A1A-92AB-4005-B341-A3C99BD24701"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57179F60-E330-4FF0-9664-B1E4637FF210"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5550_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "809A29EF-DDD9-47E4-AB84-F4CE412621B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5550_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C79FCA1-BC64-45C8-A30A-0D97A77BB26F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5550_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55EDCE66-9336-437D-ABF1-C2B3429D10C4"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E6287D95-F564-44B7-A0F9-91396D7C2C4E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C3D9650-E3FE-42BA-A94D-3D457477BAC0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7D89517A-EBBA-49EB-BBDD-9A99D2AFD79B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4511E447-F8F8-44C8-8751-375519AD01A1"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5535C936-391B-4619-AA03-B35265FC15D7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FFE1487B-1A2E-452A-B994-F5AE6745DD5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EF86FD93-6AFA-4226-A0BC-8BFE87F49026"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F1E8402E-E457-4957-B19A-8CFAAF9083FC"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1E828B8-5ECC-4A09-B2AD-DEDC558713DE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:9.4\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A372D7A8-CAF1-4500-8C32-0B7D511096B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:9.8\\(4.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1A654F5-CEC9-43E7-A38F-72F26073ABC8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:100.13\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "65AD1473-6DEF-46AA-B5F9-955ACB434DE9"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16AE20C2-C77E-4E04-BF13-A48696E52426"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "9.6",
|
|
"versionEndExcluding": "9.6.4.40",
|
|
"matchCriteriaId": "CF907DBB-5201-49EC-92C5-3BD3752BDECC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "9.8",
|
|
"versionEndExcluding": "9.8.4.20",
|
|
"matchCriteriaId": "CEB1AF51-43DA-4399-8264-E0A2E629F799"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "9.9",
|
|
"versionEndExcluding": "9.9.2.66",
|
|
"matchCriteriaId": "CEE81D32-51D0-41F7-B06B-0750DCB1F589"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "9.10",
|
|
"versionEndExcluding": "9.10.1.37",
|
|
"matchCriteriaId": "49FFDB02-2944-4B31-BBC0-30E60BA9F9D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "9.12",
|
|
"versionEndExcluding": "9.12.3.2",
|
|
"matchCriteriaId": "5BDBCE56-8434-43B5-A172-5A63536D9E9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "9.13",
|
|
"versionEndExcluding": "9.13.1.7",
|
|
"matchCriteriaId": "EE14B138-4EED-43E1-A8F1-0D16F4A761C0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-dos-qY7BHpjN",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-dos-qY7BHpjN",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |