CVE-2020-3179 (CNNVD-202005-202)
中文标题:
Cisco Firepower Threat Defense 资源管理错误漏洞
英文标题:
Cisco Firepower Threat Defense Software Generic Routing Encapsulation Tunnel IPv6 Denial of Service Vulnerability
漏洞描述
中文描述:
Cisco Firepower Threat Defense(FTD)是美国思科(Cisco)公司的一套提供下一代防火墙服务的统一软件。 Cisco FTD 6.3.0版本和6.4.0版本中存在资源管理错误漏洞,该漏洞源于在处理GRE over IPv6流量时出现内存处理错误。远程攻击者可借助带有IPv4或IPv6 payload的特制数据包利用该漏洞造成拒绝服务。
英文描述:
A vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory handling error when GRE over IPv6 traffic is processed. An attacker could exploit this vulnerability by sending crafted GRE over IPv6 packets with either IPv4 or IPv6 payload through an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Firepower Threat Defense Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_firepower_threat_defense_software:n_a:*:*:*:*:*:*:*
|
| cisco | firepower_threat_defense | * | - | - |
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
| cisco | asa_5510_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5510_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5510_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5510_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
| cisco | asa_5520_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5520_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5520_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5520_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
| cisco | asa_5540_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5540_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5540_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5540_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
| cisco | asa_5550_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5550_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5550_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5550_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 9.9\(2\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:9.9\(2\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 101.5\(1.26\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:101.5\(1.26\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
HIGHCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3179 |
2025-11-11 15:20:36 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3179 |
2025-11-11 14:56:58 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202005-202 |
2025-11-11 15:10:25 | 2025-11-11 07:56:07 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-202005-202
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 26
- data_sources: ['cve'] -> ['cve', 'nvd']