Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2021-1402

CVE information

Published

2 years ago

Last Modified

1 year ago

CVSSv2.0 Severity

High

CVSSv3.1 Severity

High

Impact Analysis

Description

A vulnerability in the software-based SSL/TLS message handler of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of SSL/TLS messages when the device performs software-based SSL decryption. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message through an affected device. SSL/TLS messages sent to an affected device do not trigger this vulnerability. A successful exploit could allow the attacker to cause a process to crash. This crash would then trigger a reload of the device. No manual intervention is needed to recover the device after the reload..

CVSSv2.0 Score

Severity
High
Base Score
7.8/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
6.9/10
Confidentiality Impact
None
Availability Impact
Complete
Integrity Impact
None

CVSSv3.1 Score

Severity
High
Base Score
8.6/10
Exploit Score
3.9/10
Access Vector
Network
Access Complexity
Low
Privileges Required
None
Impact Score
4/10
Confidentiality Impact
None
Availability Impact
High
Integrity Impact
None
Scope
Changed
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
  Yes
6.3.0 6.4.0
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
  Yes
6.5.0 6.6.0
cpe:2.3:a:cisco:firepower_threat_defense_virtual:-:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:isa_3000:-:*:*:*:*:*:*:*
  No
-