A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only.

Project Subscriptions

Vendors Products
Asa 5505 Subscribe
Asa 5505 Firmware Subscribe
Asa 5510 Subscribe
Asa 5510 Firmware Subscribe
Asa 5512-x Subscribe
Asa 5512-x Firmware Subscribe
Asa 5515-x Subscribe
Asa 5515-x Firmware Subscribe
Asa 5520 Subscribe
Asa 5520 Firmware Subscribe
Asa 5525-x Subscribe
Asa 5525-x Firmware Subscribe
Asa 5540 Subscribe
Asa 5540 Firmware Subscribe
Asa 5545-x Subscribe
Asa 5545-x Firmware Subscribe
Asa 5550 Subscribe
Asa 5550 Firmware Subscribe
Asa 5555-x Subscribe
Asa 5555-x Firmware Subscribe
Asa 5580 Subscribe
Asa 5580 Firmware Subscribe
Asa 5585-x Subscribe
Asa 5585-x Firmware Subscribe
Firepower Threat Defense Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-24459 A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-15T17:25:40.691Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3188

cve-icon Vulnrichment

Updated: 2024-08-04T07:24:00.646Z

cve-icon NVD

Status : Modified

Published: 2020-05-06T17:15:12.150

Modified: 2024-11-21T05:30:30.560

Link: CVE-2020-3188

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses