Vulnslist

find the latest Cisco vulnerabilities

Cisco Firepower System Software Server Message Block Version 2 File Policy Bypass Vulnerability

cisco-sa-20171115-firepower2 · Medium · Published · Updated

A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the Server Message Block Version 2 (SMB2) protocol. The vulnerability is due to the incorrect detection of an SMB2 file when the detection is based on the length of the file. An attacker could exploit this vulnerability by sending a crafted SMB2 transfer request through the targeted device. A successful exploit could allow the attacker to bypass filters that are configured to block SMB2 traffic. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower2

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2017-12300
Cisco Bug IDsCSCve58398
CVSS ScoreBase 5.8
Base 5.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco Firepower Management Center, Cisco Secure Firewall Management Center (FMC)

Related Products

Product CVE Evidence
Cisco Secure Firewall Management Center (FMC) CVE-2017-12300 Cisco OpenVuln
Cisco Firepower System Software CVE-2017-12300 Cisco OpenVuln
Cisco Firepower Management Center CVE-2017-12300 Cisco OpenVuln