Vulnerability Details : CVE-2023-20155
A vulnerability in a logging API in Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause the device to become unresponsive or trigger an unexpected reload. This vulnerability could also allow an attacker with valid user credentials, but not Administrator privileges, to view a system log file that they would not normally have access to. This vulnerability is due to a lack of rate-limiting of requests that are sent to a specific API that is related to an FMC log. An attacker could exploit this vulnerability by sending a high rate of HTTP requests to the API. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the FMC CPU spiking to 100 percent utilization or to the device reloading. CPU utilization would return to normal if the attack traffic was stopped before an unexpected reload was triggered.
Vulnerability category: Denial of service
Products affected by CVE-2023-20155
- Cisco » Secure Firewall Management CenterVersions from including (>=) 6.2.3 and up to, including, (<=) 6.2.3.18cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 7.1.0 and up to, including, (<=) 7.1.0.3cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 6.4.0 and up to, including, (<=) 6.4.0.16cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 7.0.0 and up to, including, (<=) 7.0.5cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 6.6.0 and up to, including, (<=) 6.6.7.1cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 7.3.0 and up to, including, (<=) 7.3.1.1cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 7.2.0 and up to, including, (<=) 7.2.3.1cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-20155
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-20155
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Cisco Systems, Inc. |
CWE ids for CVE-2023-20155
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by: nvd@nist.gov (Primary)
-
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.Assigned by: ykramarz@cisco.com (Secondary)
References for CVE-2023-20155
-
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-logview-dos-AYJdeX55
Cisco Firepower Management Center Software Log API Denial of Service VulnerabilityVendor Advisory
Jump to