CVE-2020-3572

A vulnerability in the SSL/TLS session handler of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory leak when closing SSL/TLS connections in a specific state. An attacker could exploit this vulnerability by establishing several SSL/TLS sessions and ensuring they are closed under certain conditions. A successful exploit could allow the attacker to exhaust memory resources in the affected device, which would prevent it from processing new SSL/TLS connections, resulting in a DoS. Manual intervention is required to recover an affected device.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
ciscoCNA
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
VendorProductVersion
ciscoadaptive_security_appliance
𝑥
< 9.6
ciscofirepower_threat_defense
𝑥
< 6.3.0.6
ciscofirepower_threat_defense
6.4.0 ≤
𝑥
< 6.4.0.10
ciscofirepower_threat_defense
6.5.0 ≤
𝑥
< 6.6.1
ciscoadaptive_security_appliance_software
9.8.0 ≤
𝑥
< 9.8.4.26
ciscoadaptive_security_appliance_software
9.9.0 ≤
𝑥
< 9.9.2.80
ciscoadaptive_security_appliance_software
9.10.0 ≤
𝑥
< 9.10.1.44
ciscoadaptive_security_appliance_software
9.12.0 ≤
𝑥
< 9.12.4.4
ciscoadaptive_security_appliance_software
9.13.0 ≤
𝑥
< 9.13.1.13
ciscoadaptive_security_appliance_software
9.14.0 ≤
𝑥
< 9.14.1.19
𝑥
= Vulnerable software versions