Vulnerability Details : CVE-2017-3885
A vulnerability in the detection engine reassembly of Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process consumes a high level of CPU resources. Affected Products: This vulnerability affects Cisco Firepower System Software running software releases 6.0.0, 6.1.0, 6.2.0, or 6.2.1 when the device is configured with an SSL policy that has at least one rule specifying traffic decryption. More Information: CSCvc58563. Known Affected Releases: 6.0.0 6.1.0 6.2.0 6.2.1.
Vulnerability category: Denial of service
Products affected by CVE-2017-3885
- cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-3885
0.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-3885
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | AV:N/AC:M/Au:N/C:N/I:N/A:C |
8.6
|
6.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2017-3885
-
The product does not properly control the allocation and maintenance of a limited resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-3885
-
http://www.securityfocus.com/bid/97451
Cisco Firepower System Software CVE-2017-3885 Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw
Cisco Firepower Detection Engine SSL Denial of Service VulnerabilityVendor Advisory
Jump to