CVE-2020-3255
Summary
| CVE | CVE-2020-3255 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-05-06 17:15:00 UTC |
| Updated | 2020-05-12 17:27:00 UTC |
| Description | A vulnerability in the packet processing functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to inefficient memory management. An attacker could exploit this vulnerability by sending a high rate of IPv4 or IPv6 traffic through an affected device. This traffic would need to match a configured block action in an access control policy. An exploit could allow the attacker to cause a memory exhaustion condition on the affected device, which would result in a DoS for traffic transiting the device, as well as sluggish performance of the management interface. Once the flood is stopped, performance should return to previous states. |
Risk And Classification
Problem Types: CWE-400
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Cisco | Asa 5505 | - | All | All | All |
| Hardware | Cisco | Asa 5505 | - | All | All | All |
| Operating System | Cisco | Asa 5505 Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5505 Firmware | 9.10\(1.3\) | All | All | All |
| Hardware | Cisco | Asa 5510 | - | All | All | All |
| Hardware | Cisco | Asa 5510 | - | All | All | All |
| Operating System | Cisco | Asa 5510 Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5510 Firmware | 9.10\(1.3\) | All | All | All |
| Hardware | Cisco | Asa 5512-x | - | All | All | All |
| Hardware | Cisco | Asa 5512-x | - | All | All | All |
| Operating System | Cisco | Asa 5512-x Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5512-x Firmware | 9.10\(1.3\) | All | All | All |
| Hardware | Cisco | Asa 5515-x | - | All | All | All |
| Hardware | Cisco | Asa 5515-x | - | All | All | All |
| Operating System | Cisco | Asa 5515-x Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5515-x Firmware | 9.10\(1.3\) | All | All | All |
| Hardware | Cisco | Asa 5520 | - | All | All | All |
| Hardware | Cisco | Asa 5520 | - | All | All | All |
| Operating System | Cisco | Asa 5520 Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5520 Firmware | 9.10\(1.3\) | All | All | All |
| Hardware | Cisco | Asa 5525-x | - | All | All | All |
| Hardware | Cisco | Asa 5525-x | - | All | All | All |
| Operating System | Cisco | Asa 5525-x Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5525-x Firmware | 9.10\(1.3\) | All | All | All |
| Hardware | Cisco | Asa 5540 | - | All | All | All |
| Hardware | Cisco | Asa 5540 | - | All | All | All |
| Operating System | Cisco | Asa 5540 Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5540 Firmware | 9.10\(1.3\) | All | All | All |
| Hardware | Cisco | Asa 5545-x | - | All | All | All |
| Hardware | Cisco | Asa 5545-x | - | All | All | All |
| Operating System | Cisco | Asa 5545-x Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5545-x Firmware | 9.10\(1.3\) | All | All | All |
| Hardware | Cisco | Asa 5550 | - | All | All | All |
| Hardware | Cisco | Asa 5550 | - | All | All | All |
| Operating System | Cisco | Asa 5550 Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5550 Firmware | 9.10\(1.3\) | All | All | All |
| Hardware | Cisco | Asa 5555-x | - | All | All | All |
| Hardware | Cisco | Asa 5555-x | - | All | All | All |
| Operating System | Cisco | Asa 5555-x Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5555-x Firmware | 9.10\(1.3\) | All | All | All |
| Hardware | Cisco | Asa 5580 | - | All | All | All |
| Hardware | Cisco | Asa 5580 | - | All | All | All |
| Operating System | Cisco | Asa 5580 Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5580 Firmware | 9.10\(1.3\) | All | All | All |
| Hardware | Cisco | Asa 5585-x | - | All | All | All |
| Hardware | Cisco | Asa 5585-x | - | All | All | All |
| Operating System | Cisco | Asa 5585-x Firmware | 9.10\(1.3\) | All | All | All |
| Operating System | Cisco | Asa 5585-x Firmware | 9.10\(1.3\) | All | All | All |
| Application | Cisco | Firepower Threat Defense | All | All | All | All |
| Application | Cisco | Firepower Threat Defense | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Firepower Threat Defense Software Packet Flood Denial of Service Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.