CVE-2020-3283 (CNNVD-202005-222)
中文标题:
Cisco Firepower Threat Defense 缓冲区错误漏洞
英文标题:
Cisco Firepower 1000 Series SSL/TLS Denial of Service Vulnerability
漏洞描述
中文描述:
Cisco Firepower Threat Defense(FTD)是美国思科(Cisco)公司的一套提供下一代防火墙服务的统一软件。 Cisco Firepower 1000 Series中的FTD Software的Secure Sockets Layer (SSL)/Transport Layer Security (TLS)处理器存在缓冲区错误漏洞。远程攻击者可通过发送特制的SSL/TLS消息利用该漏洞造成拒绝服务。
英文描述:
A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) handler of Cisco Firepower Threat Defense (FTD) Software when running on the Cisco Firepower 1000 Series platform could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to a communication error between internal functions. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause a buffer underrun, which leads to a crash. The crash causes the affected device to reload.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Firepower Threat Defense Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_firepower_threat_defense_software:n_a:*:*:*:*:*:*:*
|
| cisco | firepower_threat_defense | * | - | - |
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
| cisco | asa_5510_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5510_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5510_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5510_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
| cisco | asa_5520_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5520_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5520_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5520_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
| cisco | asa_5540_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5540_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5540_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5540_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
| cisco | asa_5550_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5550_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5550_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5550_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 9.12\(2.12\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:9.12\(2.12\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 9.13\(0.33\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:9.13\(0.33\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
HIGHCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3283 |
2025-11-11 15:20:37 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3283 |
2025-11-11 14:56:58 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202005-222 |
2025-11-11 15:10:25 | 2025-11-11 07:56:07 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 缓冲区错误
- cnnvd_id: 未提取 -> CNNVD-202005-222
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 26
- data_sources: ['cve'] -> ['cve', 'nvd']