Vulnerability Details : CVE-2023-20177
A vulnerability in the SSL file policy implementation of Cisco Firepower Threat Defense (FTD) Software that occurs when the SSL/TLS connection is configured with a URL Category and the Snort 3 detection engine could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to unexpectedly restart. This vulnerability exists because a logic error occurs when a Snort 3 detection engine inspects an SSL/TLS connection that has either a URL Category configured on the SSL file policy or a URL Category configured on an access control policy with TLS server identity discovery enabled. Under specific, time-based constraints, an attacker could exploit this vulnerability by sending a crafted SSL/TLS connection through an affected device. A successful exploit could allow the attacker to trigger an unexpected reload of the Snort 3 detection engine, resulting in either a bypass or denial of service (DoS) condition, depending on device configuration. The Snort 3 detection engine will restart automatically. No manual intervention is required.
Vulnerability category: Denial of service
Products affected by CVE-2023-20177
- cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.0.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:firepower_threat_defense:7.3.1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-20177
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-20177
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L |
2.2
|
1.4
|
NIST | |
4.0
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L |
2.2
|
1.4
|
Cisco Systems, Inc. |
CWE ids for CVE-2023-20177
-
Using realloc() to resize buffers that store sensitive information can leave the sensitive information exposed to attack, because it is not removed from memory.Assigned by: ykramarz@cisco.com (Secondary)
References for CVE-2023-20177
-
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-ftd-snort3-urldos-OccFQTeX
Cisco Firepower Threat Defense Software SSL/TLS URL Category and Snort 3 Detection Engine Bypass and Denial of Service VulnerabilityVendor Advisory
Jump to