Vulnerability Details : CVE-2020-3179
A vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory handling error when GRE over IPv6 traffic is processed. An attacker could exploit this vulnerability by sending crafted GRE over IPv6 packets with either IPv4 or IPv6 payload through an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2020-3179
Probability of exploitation activity in the next 30 days: 0.16%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 52 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2020-3179
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
8.6
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
3.9
|
4.0
|
Cisco Systems, Inc. |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2020-3179
-
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.Assigned by:
- nvd@nist.gov (Primary)
- ykramarz@cisco.com (Secondary)
References for CVE-2020-3179
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-2-sS2h7aWe
Cisco Firepower Threat Defense Software Generic Routing Encapsulation Tunnel IPv6 Denial of Service VulnerabilityVendor Advisory
Products affected by CVE-2020-3179
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5505_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5505_firmware:101.5\(1.26\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5510_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5510_firmware:101.5\(1.26\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5512-x_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5512-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5515-x_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5515-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5520_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5520_firmware:101.5\(1.26\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5525-x_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5525-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5540_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5540_firmware:101.5\(1.26\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5545-x_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5545-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5550_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5550_firmware:101.5\(1.26\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5555-x_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5555-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5580_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5580_firmware:101.5\(1.26\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5585-x_firmware:9.9\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asa_5585-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*