Security restrictions bypass in Cisco Firepower Management



Published: 2018-05-17
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-0297
CWE-ID CWE-19
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cisco Firepower Management Center
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Data handling

EUVDB-ID: #VU12792

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-0297

CWE-ID: CWE-19 - Data Handling

Exploit availability: No

Description

The vulnerability allows a remote unauthenticated attacker to bypass security restrictions and write arbitrary files on the target system.

The weakness exists in the detection engine due to the incorrect handling of TCP SSL packets received out of order. A remote attacker can send a specially crafted SSL connection, bypass a configured SSL AC policy and block SSL traffic.

Mitigation

Update to version 6.2.3 or 6.2.2.3.

Vulnerable software versions

Cisco Firepower Management Center: 6.0.0 - 6.2.3

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-firepwr-pb


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###