Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "17F461B5-E600-4C81-BA3C-1DBC90D4D438", "versionEndExcluding": "6.4.0.13", "versionStartIncluding": "6.4.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A74256-AF9A-473B-9DC7-A57618BA9F00", "versionEndExcluding": "6.6.5", "versionStartIncluding": "6.6.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "98DEDDAB-B8C5-4753-A208-94638E694FC1", "versionEndExcluding": "6.7.0.3", "versionStartIncluding": "6.7.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B2F537A-A488-45B6-AD4B-48B7064AE84C", "versionEndExcluding": "7.0.1", "versionStartIncluding": "7.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F6EF272-6D43-476C-B35D-DDE79A7A01C5", "versionEndExcluding": "9.8.4.40", "versionStartIncluding": "9.8.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "B10BB7F0-1CC7-4331-A05C-3C20B0584C04", "versionEndExcluding": "9.12.4.29", "versionStartIncluding": "9.12.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6828628-B179-4188-92CE-1D488859D92D", "versionEndExcluding": "9.14.3.9", "versionStartIncluding": "9.14.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6EC0723-CBC7-45A7-8B30-B680E8A771EF", "versionEndExcluding": "9.15.1.17", "versionStartIncluding": "9.15.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "310B86D1-730D-4D8A-AC95-31FBE4F7D1E6", "versionEndExcluding": "9.16.2.3", "versionStartIncluding": "9.16.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "matchCriteriaId": "75F668D8-664D-4BA3-B15C-CD26BE55A7A6", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC11F329-2DE6-4CC5-B548-8A2B51325444", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FB8A813-FDA4-4A92-9A46-9BCEB9CA90E0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5512-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "matchCriteriaId": "156ED8FB-E2DD-4E84-98D7-18EA42D51439", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "08F0F160-DAD2-48D4-B7B2-4818B2526F35", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "matchCriteriaId": "7964F713-2C01-46BF-B854-F3035666C407", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "matchCriteriaId": "C3D933AE-8EC0-43FC-84EA-FB4E027EF249", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "matchCriteriaId": "76CE2818-59C5-4841-AF19-FF6DF922DBA9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5505_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "matchCriteriaId": "96B2A339-F296-47E0-87CB-D52E2F5E3283", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "matchCriteriaId": "3094D0EC-D1C9-4FC4-B35C-7293F13E9ABF", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "matchCriteriaId": "17F07A2C-8A60-443C-B227-BE7613FFDA12", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "matchCriteriaId": "E5EB1E56-1D97-452F-8A77-EAB4DBC91E74", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5515-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "matchCriteriaId": "46373218-888A-40D2-80B5-3D0004B36142", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "977D597B-F6DE-4438-AB02-06BE64D71EBE", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E2DA8D4-EE0B-4F45-AA9A-C2FA041E5E48", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "matchCriteriaId": "50BFC05A-8EC7-4735-B102-6EDF99489A36", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "matchCriteriaId": "2417DB3A-8F9D-424D-A7A1-E8F5A550D840", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5525-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A4D7B2F-3C45-476C-AA8F-536D1AB17777", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB71EB29-0115-4307-A9F7-262394FD9FB0", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "matchCriteriaId": "2661ECD3-AD62-42FF-9A3D-F18D012D4726", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "matchCriteriaId": "995A8981-5E91-4CE0-9986-3C462900834A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6A25983-C296-468F-9EA9-F69EF5EE48C1", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5545-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "matchCriteriaId": "C471157A-DEF4-4DE5-92CC-AB5FD222881F", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "57179F60-E330-4FF0-9664-B1E4637FF210", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "matchCriteriaId": "E69D9C0A-2DD1-4EDF-AFA5-E7311D8D5252", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "matchCriteriaId": "86C6C5E4-A2C9-49EA-B88E-4C39D401E80B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "matchCriteriaId": "DC252DB9-0CB9-4B40-B21A-33D7C90414C9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5555-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "matchCriteriaId": "50D8FC2B-80A5-41FB-B0B3-1BC2C36034E8", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5535C936-391B-4619-AA03-B35265FC15D7", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "matchCriteriaId": "0DF52F91-AE46-4825-AAA3-E053FD247872", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "matchCriteriaId": "87596BBB-33F4-45A3-92A6-6918B706B5BD", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "matchCriteriaId": "EA58ACA1-F693-4728-84BB-DCA54FD7E664", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5580_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "matchCriteriaId": "0482D81B-0FF1-4743-85DB-7386CC3906B1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1E828B8-5ECC-4A09-B2AD-DEDC558713DE", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "matchCriteriaId": "456EB0AC-17DC-4A3F-858B-0325B123CEDF", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A59106E-B38B-4DA4-BB16-2235639A5551", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "matchCriteriaId": "338CB0C2-CDC9-4316-8D34-331954943C6D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:asa_5585-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "matchCriteriaId": "40D07677-AEDB-4BDE-9446-EFF0A8A52FD9", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "16AE20C2-C77E-4E04-BF13-A48696E52426", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "A vulnerability in the memory management of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management when connection rates are high. An attacker could exploit this vulnerability by opening a significant number of connections on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."}, {"lang": "es", "value": "Una vulnerabilidad en la administraci\u00f3n de la memoria del software Cisco Adaptive Security Appliance (ASA) y del software Firepower Threat Defense (FTD) podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad es debido a una administraci\u00f3n inapropiada de los recursos cuando las tasas de conexi\u00f3n son altas. Un atacante podr\u00eda explotar esta vulnerabilidad al abrir un n\u00famero significativo de conexiones en un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una recarga del dispositivo, resultando en una condici\u00f3n de DoS"}], "id": "CVE-2021-34792", "lastModified": "2024-11-21T06:11:12.907", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "ykramarz@cisco.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-10-27T19:15:08.510", "references": [{"source": "ykramarz@cisco.com", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dos-Unk689XY"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dos-Unk689XY"}], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-400"}], "source": "ykramarz@cisco.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-401"}], "source": "nvd@nist.gov", "type": "Primary"}]}