CVE-2018-0384
Summary
| CVE | CVE-2018-0384 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-16 17:29:00 UTC |
| Updated | 2019-10-09 23:31:00 UTC |
| Description | A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a URL-based access control policy that is configured to block traffic for an affected system. The vulnerability exists because the affected software incorrectly handles TCP packets that are received out of order when a TCP SYN retransmission is issued. An attacker could exploit this vulnerability by sending a maliciously crafted connection through an affected device. A successful exploit could allow the attacker to bypass a URL-based access control policy that is configured to block traffic for the affected system. Cisco Bug IDs: CSCvh84511. |
Risk And Classification
Problem Types: CWE-693
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cisco | Firepower Management Center | 6.0.0 | All | All | All |
| Application | Cisco | Firepower Management Center | 6.1.0 | All | All | All |
| Application | Cisco | Firepower Management Center | 6.2.0 | All | All | All |
| Application | Cisco | Firepower Management Center | 6.2.1 | All | All | All |
| Application | Cisco | Firepower Management Center | 6.2.2 | All | All | All |
| Application | Cisco | Firepower Management Center | 6.0.0 | All | All | All |
| Application | Cisco | Firepower Management Center | 6.1.0 | All | All | All |
| Application | Cisco | Firepower Management Center | 6.2.0 | All | All | All |
| Application | Cisco | Firepower Management Center | 6.2.1 | All | All | All |
| Application | Cisco | Firepower Management Center | 6.2.2 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco FireSIGHT System Software URL-Based Access Control Policy Bypass Vulnerability | CONFIRM | tools.cisco.com | Vendor Advisory |
| Cisco FireSIGHT TCP Packet Processing Flaw Lets Remote Users Bypass URL-Based Access Restrictions on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| Cisco FireSIGHT System Software CVE-2018-0384 Remote Security Bypass Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.