// For flags

CVE-2018-0244

 

Severity Score

5.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a configured file action policy to drop the Server Message Block (SMB) protocol if a malware file is detected. The vulnerability is due to how the SMB protocol handles a case in which a large file transfer fails. This case occurs when some pieces of the file are successfully transferred to the remote endpoint, but ultimately the file transfer fails and is reset. An attacker could exploit this vulnerability by sending a crafted SMB file transfer request through the targeted device. An exploit could allow the attacker to pass an SMB file that contains malware, which the device is configured to block. This vulnerability affects Cisco Firepower System Software when one or more file action policies are configured, on software releases prior to 6.2.3. Cisco Bug IDs: CSCvc20141.

Una vulnerabilidad en el motor de detección de Cisco Firepower System Software podría permitir que un atacante remoto sin autenticar omita una política de acción de archivos que esté configurada para anular el protocolo Server Message Block si se detecta un archivo de malware. La vulnerabilidad se debe a cómo el protocolo SMB gestiona un caso en el que fracasa una transferencia de un archivo grande. Este caso ocurre cuando algunas partes del archivo se transfieren con éxito al endpoint remoto pero, en última instancia, la transferencia fracasa y se reinicia. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición de transferencia de SMB manipulada al dispositivo objetivo. Su explotación podría permitir que el atacante pase un archivo SMB que contiene malware, que el dispositivo debe bloquear. Esta vulnerabilidad afecta a Cisco Firepower System Software cuando una o más políticas de acción de archivos están configuradas en versiones del software anteriores a la 6.2.3. Cisco Bug IDs: CSCvc20141.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-04-19 CVE Published
  • 2024-02-27 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-693: Protection Mechanism Failure
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
< 6.2.3
Search vendor "Cisco" for product "Firepower Threat Defense" and version " < 6.2.3"
-
Affected