CVE-2024-20261
22.05.2024, 17:16
A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file. This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | firepower_threat_defense | 6.2.3 |
cisco | firepower_threat_defense | 6.2.3.1 |
cisco | firepower_threat_defense | 6.2.3.2 |
cisco | firepower_threat_defense | 6.2.3.3 |
cisco | firepower_threat_defense | 6.2.3.4 |
cisco | firepower_threat_defense | 6.2.3.5 |
cisco | firepower_threat_defense | 6.2.3.6 |
cisco | firepower_threat_defense | 6.2.3.7 |
cisco | firepower_threat_defense | 6.2.3.8 |
cisco | firepower_threat_defense | 6.2.3.9 |
cisco | firepower_threat_defense | 6.2.3.10 |
cisco | firepower_threat_defense | 6.2.3.11 |
cisco | firepower_threat_defense | 6.2.3.12 |
cisco | firepower_threat_defense | 6.2.3.13 |
cisco | firepower_threat_defense | 6.2.3.14 |
cisco | firepower_threat_defense | 6.2.3.15 |
cisco | firepower_threat_defense | 6.2.3.16 |
cisco | firepower_threat_defense | 6.2.3.17 |
cisco | firepower_threat_defense | 6.2.3.18 |
cisco | firepower_threat_defense | 6.4.0 |
cisco | firepower_threat_defense | 6.4.0.1 |
cisco | firepower_threat_defense | 6.4.0.2 |
cisco | firepower_threat_defense | 6.4.0.3 |
cisco | firepower_threat_defense | 6.4.0.4 |
cisco | firepower_threat_defense | 6.4.0.5 |
cisco | firepower_threat_defense | 6.4.0.6 |
cisco | firepower_threat_defense | 6.4.0.7 |
cisco | firepower_threat_defense | 6.4.0.8 |
cisco | firepower_threat_defense | 6.4.0.9 |
cisco | firepower_threat_defense | 6.4.0.10 |
cisco | firepower_threat_defense | 6.4.0.11 |
cisco | firepower_threat_defense | 6.4.0.12 |
cisco | firepower_threat_defense | 6.4.0.13 |
cisco | firepower_threat_defense | 6.4.0.14 |
cisco | firepower_threat_defense | 6.4.0.15 |
cisco | firepower_threat_defense | 6.4.0.16 |
cisco | firepower_threat_defense | 6.6.0 |
cisco | firepower_threat_defense | 6.6.0.1 |
cisco | firepower_threat_defense | 6.6.1 |
cisco | firepower_threat_defense | 6.6.3 |
cisco | firepower_threat_defense | 6.6.4 |
cisco | firepower_threat_defense | 6.6.5 |
cisco | firepower_threat_defense | 6.6.5.1 |
cisco | firepower_threat_defense | 6.6.5.2 |
cisco | firepower_threat_defense | 6.6.7 |
cisco | firepower_threat_defense | 6.6.7.1 |
cisco | firepower_threat_defense | 6.6.7.2 |
cisco | firepower_threat_defense | 6.7.0 |
cisco | firepower_threat_defense | 6.7.0.1 |
cisco | firepower_threat_defense | 6.7.0.2 |
cisco | firepower_threat_defense | 6.7.0.3 |
cisco | firepower_threat_defense | 7.0.0 |
cisco | firepower_threat_defense | 7.0.0.1 |
cisco | firepower_threat_defense | 7.0.1 |
cisco | firepower_threat_defense | 7.0.1.1 |
cisco | firepower_threat_defense | 7.0.2 |
cisco | firepower_threat_defense | 7.0.2.1 |
cisco | firepower_threat_defense | 7.0.3 |
cisco | firepower_threat_defense | 7.0.4 |
cisco | firepower_threat_defense | 7.0.5 |
cisco | firepower_threat_defense | 7.1.0 |
cisco | firepower_threat_defense | 7.1.0.1 |
cisco | firepower_threat_defense | 7.1.0.3 |
cisco | firepower_threat_defense | 7.2.0 |
cisco | firepower_threat_defense | 7.2.0.1 |
cisco | firepower_threat_defense | 7.2.1 |
cisco | firepower_threat_defense | 7.2.2 |
cisco | firepower_threat_defense | 7.2.3 |
cisco | firepower_threat_defense | 7.2.4 |
cisco | firepower_threat_defense | 7.3.0 |
cisco | firepower_threat_defense | 7.3.1 |
cisco | firepower_threat_defense | 7.3.1.1 |
cisco | firepower_threat_defense | 7.3.1.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration