Cisco Secure Firewall Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability
A vulnerability in Cisco Secure Firewall Threat Defense (FTD) SSL decryption feature with Do Not Decrypt exclusion allows an unauthenticated remote attacker to cause a device reload. The vulnerability is triggered by improper memory management when the firewall inspects crafted TLS 1.2 encrypted traffic. Only TLS 1.2 traffic is affected; other TLS versions are not vulnerable. A successful attack causes the firewall to crash and reboot, interrupting security policy enforcement and traffic inspection. Cisco has released software updates to address this issue; no workarounds are available.
- Network path to the firewall's external interface
- Ability to send TLS 1.2 traffic toward the firewall
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f16c57ef-7a78-479b-80ee-65e510295f52Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.