CVE-2022-20854
15.11.2022, 21:15
A vulnerability in the processing of SSH connections of Cisco Firepower Management Center (FMC) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a reboot on the affected device.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | secure_firewall_management_center | 6.1.0 ≤ 𝑥 ≤ 6.1.0.7 |
cisco | secure_firewall_management_center | 6.2.0 ≤ 𝑥 ≤ 6.2.0.6 |
cisco | secure_firewall_management_center | 6.2.2 ≤ 𝑥 ≤ 6.2.2.5 |
cisco | secure_firewall_management_center | 6.2.3 ≤ 𝑥 ≤ 6.2.3.18 |
cisco | secure_firewall_management_center | 6.3.0 ≤ 𝑥 ≤ 6.3.0.5 |
cisco | secure_firewall_management_center | 6.4.0 ≤ 𝑥 ≤ 6.4.0.15 |
cisco | secure_firewall_management_center | 6.5.0 ≤ 𝑥 ≤ 6.5.0.5 |
cisco | secure_firewall_management_center | 6.7.0 ≤ 𝑥 ≤ 6.7.0.3 |
cisco | secure_firewall_management_center | 6.2.1 |
cisco | secure_firewall_management_center | 6.6.0 |
cisco | secure_firewall_management_center | 6.6.0.1 |
cisco | secure_firewall_management_center | 6.6.1 |
cisco | secure_firewall_management_center | 6.6.3 |
cisco | secure_firewall_management_center | 6.6.4 |
cisco | secure_firewall_management_center | 6.6.5 |
cisco | secure_firewall_management_center | 6.6.5.1 |
cisco | secure_firewall_management_center | 6.6.5.2 |
cisco | secure_firewall_management_center | 7.0.0 |
cisco | secure_firewall_management_center | 7.0.0.1 |
cisco | secure_firewall_management_center | 7.0.1 |
cisco | secure_firewall_management_center | 7.0.1.1 |
cisco | secure_firewall_management_center | 7.0.2 |
cisco | secure_firewall_management_center | 7.0.2.1 |
cisco | secure_firewall_management_center | 7.0.3 |
cisco | secure_firewall_management_center | 7.0.4 |
cisco | firepower_threat_defense | 6.1.0 ≤ 𝑥 ≤ 6.1.0.7 |
cisco | firepower_threat_defense | 6.2.0 ≤ 𝑥 ≤ 6.2.0.6 |
cisco | firepower_threat_defense | 6.2.2 ≤ 𝑥 ≤ 6.2.2.5 |
cisco | firepower_threat_defense | 6.2.3 ≤ 𝑥 ≤ 6.2.3.18 |
cisco | firepower_threat_defense | 6.3.0 ≤ 𝑥 ≤ 6.3.0.5 |
cisco | firepower_threat_defense | 6.4.0 ≤ 𝑥 ≤ 6.4.0.15 |
cisco | firepower_threat_defense | 6.5.0 ≤ 𝑥 ≤ 6.5.0.5 |
cisco | firepower_threat_defense | 6.7.0 ≤ 𝑥 ≤ 6.7.0.3 |
cisco | firepower_threat_defense | 6.2.1 |
cisco | firepower_threat_defense | 6.6.0 |
cisco | firepower_threat_defense | 6.6.0.1 |
cisco | firepower_threat_defense | 6.6.1 |
cisco | firepower_threat_defense | 6.6.3 |
cisco | firepower_threat_defense | 6.6.4 |
cisco | firepower_threat_defense | 6.6.5 |
cisco | firepower_threat_defense | 6.6.5.1 |
cisco | firepower_threat_defense | 6.6.5.2 |
cisco | firepower_threat_defense | 7.0.0 |
cisco | firepower_threat_defense | 7.0.0.1 |
cisco | firepower_threat_defense | 7.0.1 |
cisco | firepower_threat_defense | 7.0.1.1 |
cisco | firepower_threat_defense | 7.0.2 |
cisco | firepower_threat_defense | 7.0.2.1 |
cisco | firepower_threat_defense | 7.0.3 |
cisco | firepower_threat_defense | 7.0.4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-400 - Uncontrolled Resource ConsumptionThe software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
- CWE-755 - Improper Handling of Exceptional ConditionsThe software does not handle or incorrectly handles an exceptional condition.