CVE-2020-3196 (CNNVD-202005-213)
中文标题:
Cisco Firepower Threat Defense和Adaptive Security Appliances Software 资源管理错误漏洞
英文标题:
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Denial of Service Vulnerability
漏洞描述
中文描述:
Cisco Firepower Threat Defense(FTD)和Cisco Adaptive Security Appliances Software(ASA Software)都是美国思科(Cisco)公司的产品。Cisco Firepower Threat Defense是一套提供下一代防火墙服务的统一软件。Cisco Adaptive Security Appliances Software是一套防火墙和网络安全平台。该平台提供了对数据和网络资源的高度安全的访问等功能。 Cisco ASA Software和FTD Software中的Secure Sockets Layer (SSL)/Transport Layer Security (TLS)处理器存在资源管理错误漏洞,该漏洞源于对所接收到SSL/TLS连接,程序没有进行正确的资源管理。远程攻击者可通过创建多个SSL/TLS连接利用该漏洞造成拒绝服务。
英文描述:
A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) handler of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to exhaust memory resources on the affected device, leading to a denial of service (DoS) condition. The vulnerability is due to improper resource management for inbound SSL/TLS connections. An attacker could exploit this vulnerability by establishing multiple SSL/TLS connections with specific conditions to the affected device. A successful exploit could allow the attacker to exhaust the memory on the affected device, causing the device to stop accepting new SSL/TLS connections and resulting in a DoS condition for services on the device that process SSL/TLS traffic. Manual intervention is required to recover an affected device.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Adaptive Security Appliance (ASA) Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_adaptive_security_appliance_(asa)_software:n_a:*:*:*:*:*:*:*
|
| cisco | firepower_threat_defense | * | - | - |
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | asa_5510_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5510_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5510_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5510_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5510_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5510_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | asa_5520_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5520_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5520_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5520_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5520_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5520_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | asa_5540_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5540_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5540_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5540_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5540_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5540_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | asa_5550_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5550_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5550_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5550_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5550_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5550_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 9.4\(4\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:9.4\(4\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 9.8\(4.18\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:9.8\(4.18\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 100.13\(0\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:100.13\(0\):*:*:*:*:*:*:*
|
| cisco | adaptive_security_appliance_software | * | - | - |
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
HIGHCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3196 |
2025-11-11 15:20:36 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3196 |
2025-11-11 14:56:58 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202005-213 |
2025-11-11 15:10:25 | 2025-11-11 07:56:07 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-202005-213
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 39
- data_sources: ['cve'] -> ['cve', 'nvd']