A vulnerability in the logging configuration of Secure Sockets Layernbsp;(SSL) policies for Cisconbsp;FirePOWER System Software could allow an unauthenticated, remote attacker to cause a denial of servicenbsp;(DoS) condition due to high consumption of system resources.

The vulnerability is due to the logging of certain TCP packets by the affected software.

An attacker could exploit this vulnerability by sending a flood of crafted TCP packets to an affected device.

A successful exploit could allow the attacker to cause a DoS condition.

The success of an exploit is dependent on how an administrator has configured logging for SSL policies for a device.

There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-fpwr
A vulnerability in the logging configuration of Secure Sockets Layernbsp;(SSL) policies for Cisconbsp;FirePOWER System Software could allow an unauthenticated, remote attacker to cause a denial of servicenbsp;(DoS) condition due to high consumption of system resources.

The vulnerability is due to the logging of certain TCP packets by the affected software.

An attacker could exploit this vulnerability by sending a flood of crafted TCP packets to an affected device.

A successful exploit could allow the attacker to cause a DoS condition.

The success of an exploit is dependent on how an administrator has configured logging for SSL policies for a device.

There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-fpwr

Security Impact Rating: Medium

CVE: CVE-2017-6632

Leave a Reply