Rewterz Threat Advisory – Security Issues in SAP’s Cloud-Based Products
May 7, 2020Rewterz Threat Alert – COVID-19 Phishing Email Indicators
May 7, 2020Rewterz Threat Advisory – Security Issues in SAP’s Cloud-Based Products
May 7, 2020Rewterz Threat Alert – COVID-19 Phishing Email Indicators
May 7, 2020Severity
High
Analysis Summary
CVE-2020-3283
The vulnerability is due to a communication error between internal functions. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause a buffer underrun, which leads to a crash. The crash causes the affected device to reload.
CVE-2020-3189
The vulnerability is due to the system memory not being properly freed for a VPN System Logging event generated when a VPN session is created or deleted. An attacker could exploit this vulnerability by repeatedly creating or deleting a VPN tunnel connection, which could leak a small amount of system memory for each logging event. A successful exploit could allow the attacker to cause system memory depletion, which can lead to a systemwide denial of service (DoS) condition. The attacker does not have any control of whether VPN System Logging is configured or not on the device, but it is enabled by default.
CVE-2020-3255
The vulnerability is due to inefficient memory management. An attacker could exploit this vulnerability by sending a high rate of IPv4 or IPv6 traffic through an affected device. This traffic would need to match a configured block action in an access control policy. An exploit could allow the attacker to cause a memory exhaustion condition on the affected device, which would result in a DoS for traffic transiting the device, as well as sluggish performance of the management interface. Once the flood is stopped, performance should return to previous states.
CVE-2020-3187
The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences. An exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored.
CVE-2020-3254
The vulnerabilities are due to inefficient memory management. An attacker could exploit these vulnerabilities by sending crafted MGCP packets through an affected device. An exploit could allow the attacker to cause memory exhaustion resulting in a restart of an affected device, causing a DoS condition for traffic traversing the device.
Impact
- Denial of Service
- Path Traversal
Affected Vendors
Cisco
Affected Products
- Cisco Firepower 1000 Series appliances
- Cisco FTD Software
- Cisco ASA Software
Remediation
Refer to vendor’s advisory for the list of affected products and upgraded patches. |