A vulnerability in the internal packet-processing functionality of Cisco Firepower Threat Defense (FTD) Software for the Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error, which may prevent ingress buffers from being replenished under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to consume all input buffers, which are shared between all interfaces, leading to a queue wedge condition in all active interfaces. This situation would cause an affected device to stop processing any incoming traffic and result in a DoS condition until the device is reloaded manually.
History

Tue, 19 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2019-05-03T16:00:26.411998Z

Updated: 2024-11-19T19:09:06.294Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1703

cve-icon Vulnrichment

Updated: 2024-08-04T18:28:42.326Z

cve-icon NVD

Status : Modified

Published: 2019-05-03T16:29:00.430

Modified: 2024-11-21T04:37:08.240

Link: CVE-2019-1703

cve-icon Redhat

No data.