CVE-2020-3188 (CNNVD-202005-203)
中文标题:
Cisco Firepower Threat Defense 资源管理错误漏洞
英文标题:
Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability
漏洞描述
中文描述:
Cisco Firepower Threat Defense(FTD)是美国思科(Cisco)公司的一套提供下一代防火墙服务的统一软件。 Cisco FTD 6.4.0.9之前版本和6.5.0.5之前版本中会话超时(用于管理连接)的处理方法存在资源管理错误漏洞。攻击者可通过向受影响的设备持续发送大量特制远程管理连接利用该漏洞导致远程管理界面或Cisco Firepower Threat Defense停止响应,并使其他管理功能脱机,从而导致拒绝服务。
英文描述:
A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Firepower Threat Defense Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_firepower_threat_defense_software:n_a:*:*:*:*:*:*:*
|
| cisco | firepower_threat_defense | * | - | - |
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
| cisco | asa_5510_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5510_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5510_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5510_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
| cisco | asa_5520_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5520_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5520_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5520_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
| cisco | asa_5540_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5540_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5540_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5540_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
| cisco | asa_5550_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5550_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5550_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5550_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 9.8\(3\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:9.8\(3\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 101.6\(1.96\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:101.6\(1.96\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
MEDIUMCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3188 |
2025-11-11 15:20:36 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3188 |
2025-11-11 14:56:58 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202005-203 |
2025-11-11 15:10:25 | 2025-11-11 07:56:07 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-202005-203
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 26
- data_sources: ['cve'] -> ['cve', 'nvd']