// For flags

CVE-2023-20155

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in a logging API in Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause the device to become unresponsive or trigger an unexpected reload. This vulnerability could also allow an attacker with valid user credentials, but not Administrator privileges, to view a system log file that they would not normally have access to. This vulnerability is due to a lack of rate-limiting of requests that are sent to a specific API that is related to an FMC log. An attacker could exploit this vulnerability by sending a high rate of HTTP requests to the API. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the FMC CPU spiking to 100 percent utilization or to the device reloading. CPU utilization would return to normal if the attack traffic was stopped before an unexpected reload was triggered.

Una vulnerabilidad en una API de registro en el software Cisco Firepower Management Center (FMC) podría permitir que un atacante remoto no autenticado haga que el dispositivo deje de responder o desencadene una recarga inesperada. Esta vulnerabilidad también podría permitir que un atacante con credenciales de usuario válidas, pero sin privilegios de administrador, vea un archivo de registro del sistema al que normalmente no tendría acceso. Esta vulnerabilidad se debe a la falta de limitación de la velocidad de las solicitudes que se envían a una API específica relacionada con un registro FMC. Un atacante podría aprovechar esta vulnerabilidad enviando una alta tasa de solicitudes HTTP a la API. Un exploit exitoso podría permitir al atacante causar una condición de Denegación de Servicio (DoS) debido a que la CPU del FMC alcanza el 100 por ciento de utilización o a que el dispositivo se recarga. La utilización de la CPU volvería a la normalidad si el tráfico de ataque se detuviera antes de que se desencadenara una recarga inesperada.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-10-27 CVE Reserved
  • 2023-11-01 CVE Published
  • 2023-11-10 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
>= 6.2.3 <= 6.2.3.18
Search vendor "Cisco" for product "Firepower Management Center" and version " >= 6.2.3 <= 6.2.3.18"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
>= 6.4.0 <= 6.4.0.16
Search vendor "Cisco" for product "Firepower Management Center" and version " >= 6.4.0 <= 6.4.0.16"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
>= 6.6.0 <= 6.6.7.1
Search vendor "Cisco" for product "Firepower Management Center" and version " >= 6.6.0 <= 6.6.7.1"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
>= 7.0.0 <= 7.0.5
Search vendor "Cisco" for product "Firepower Management Center" and version " >= 7.0.0 <= 7.0.5"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
>= 7.1.0 <= 7.1.0.3
Search vendor "Cisco" for product "Firepower Management Center" and version " >= 7.1.0 <= 7.1.0.3"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
>= 7.2.0 <= 7.2.3.1
Search vendor "Cisco" for product "Firepower Management Center" and version " >= 7.2.0 <= 7.2.3.1"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
>= 7.3.0 <= 7.3.1.1
Search vendor "Cisco" for product "Firepower Management Center" and version " >= 7.3.0 <= 7.3.1.1"
-
Affected