A vulnerability in the detection engine reassembly of Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process consumes a high level of CPU resources. Affected Products: This vulnerability affects Cisco Firepower System Software running software releases 6.0.0, 6.1.0, 6.2.0, or 6.2.1 when the device is configured with an SSL policy that has at least one rule specifying traffic decryption. More Information: CSCvc58563. Known Affected Releases: 6.0.0 6.1.0 6.2.0 6.2.1.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/97451 | Third Party Advisory VDB Entry | 
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw | Vendor Advisory | 
| http://www.securityfocus.com/bid/97451 | Third Party Advisory VDB Entry | 
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    26 Nov 2024, 16:09
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:cisco:firepower_management_center:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:6.2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:6.2.1:*:*:*:*:*:*:* | cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:* | 
| First Time | Cisco secure Firewall Management Center | |
| CPE | cpe:2.3:a:cisco:firepower_management_center:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:6.2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:6.2.1:*:*:*:*:*:*:* | cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:* | 
21 Nov 2024, 03:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/bid/97451 - Third Party Advisory, VDB Entry | |
| References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw - Vendor Advisory | 
Information
                Published : 2017-04-07 17:59
Updated : 2025-04-20 01:37
NVD link : CVE-2017-3885
Mitre link : CVE-2017-3885
CVE.ORG link : CVE-2017-3885
JSON object : View
Products Affected
                cisco
- secure_firewall_management_center
CWE
                
                    
                        
                        CWE-400
                        
            Uncontrolled Resource Consumption
