// For flags

CVE-2022-20748

Cisco Firepower Threat Defense Software Local Malware Analysis Denial of Service Vulnerability

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability in the local malware analysis process of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to insufficient error handling in the local malware analysis process of an affected device. An attacker could exploit this vulnerability by sending a crafted file through the device. A successful exploit could allow the attacker to cause the local malware analysis process to crash, which could result in a DoS condition. Notes: Manual intervention may be required to recover from this situation. Malware cloud lookup and dynamic analysis will not be impacted.

Una vulnerabilidad en el proceso de análisis local de malware del software Cisco Firepower Threat Defense (FTD) podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en el dispositivo afectado. Esta vulnerabilidad es debido a una administración de errores insuficiente en el proceso de análisis de malware local de un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad mediante el envío de un archivo diseñado a través del dispositivo. Una explotación con éxito podría permitir al atacante causar un bloqueo del proceso de análisis de malware local, lo que podría resultar en una condición de DoS. Notas: Puede ser necesaria la intervención manual para recuperarse de esta situación. La búsqueda en la nube de malware y el análisis dinámico no estarán afectados

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2021-11-02 CVE Reserved
  • 2022-05-03 CVE Published
  • 2023-11-23 EPSS Updated
  • 2024-11-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-664: Improper Control of a Resource Through its Lifetime
  • CWE-755: Improper Handling of Exceptional Conditions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
7.0.0
Search vendor "Cisco" for product "Firepower Threat Defense" and version "7.0.0"
-
Affected