Vulnerabilities > Cisco > Firepower Threat Defense > 6.2.1

DATE CVE VULNERABILITY TITLE RISK
2019-02-21 CVE-2019-1691 Improper Handling of Exceptional Conditions vulnerability in Cisco Firepower Threat Defense
A vulnerability in the detection engine of Cisco Firepower Threat Defense Software could allow an unauthenticated, remote attacker to cause the unexpected restart of the SNORT detection engine, resulting in a denial of service (DoS) condition.
network
low complexity
cisco CWE-755
5.0
2018-10-05 CVE-2018-0453 OS Command Injection vulnerability in Cisco Firepower Threat Defense
A vulnerability in the Sourcefire tunnel control channel protocol in Cisco Firepower System Software running on Cisco Firepower Threat Defense (FTD) sensors could allow an authenticated, local attacker to execute specific CLI commands with root privileges on the Cisco Firepower Management Center (FMC), or through Cisco FMC on other Firepower sensors and devices that are controlled by the same Cisco FMC.
local
low complexity
cisco CWE-78
7.2
2018-06-07 CVE-2018-0296 Path Traversal vulnerability in Cisco Adaptive Security Appliance Software
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.
network
low complexity
cisco CWE-22
7.5
2018-04-19 CVE-2018-0254 Protection Mechanism Failure vulnerability in Cisco Firepower Threat Defense
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass configured file action policies if an Intelligent Application Bypass (IAB) with a drop percentage threshold is also configured.
network
low complexity
cisco CWE-693
5.0
2018-04-19 CVE-2018-0244 Protection Mechanism Failure vulnerability in Cisco Firepower Threat Defense
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a configured file action policy to drop the Server Message Block (SMB) protocol if a malware file is detected.
network
low complexity
cisco CWE-693
5.0
2018-04-19 CVE-2018-0243 Protection Mechanism Failure vulnerability in Cisco Firepower Threat Defense
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a configured file action policy that is intended to drop the Server Message Block Version 2 (SMB2) and SMB Version 3 (SMB3) protocols if malware is detected.
network
low complexity
cisco CWE-693
5.0
2018-04-19 CVE-2018-0240 Unspecified vulnerability in Cisco products
Multiple vulnerabilities in the Application Layer Protocol Inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition.
network
low complexity
cisco
8.6
2018-04-19 CVE-2018-0231 Out-of-bounds Write vulnerability in Cisco products
A vulnerability in the Transport Layer Security (TLS) library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of the affected device, resulting in a denial of service (DoS) condition.
network
low complexity
cisco CWE-787
8.6
2018-04-19 CVE-2018-0230 Resource Exhaustion vulnerability in Cisco products
A vulnerability in the internal packet-processing functionality of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition.
network
low complexity
cisco CWE-400
8.6
2018-04-19 CVE-2018-0228 Improper Locking vulnerability in Cisco Adaptive Security Appliance Software
A vulnerability in the ingress flow creation functionality of Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause the CPU to increase upwards of 100% utilization, causing a denial of service (DoS) condition on an affected system.
network
low complexity
cisco CWE-667
8.6