Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-3458 (GCVE-0-2020-3458)
Vulnerability from cvelistv5
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: n/a |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:37:54.379Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20201021 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3458",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-13T17:17:23.563766Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-13T17:49:16.063Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Adaptive Security Appliance (ASA) Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-10-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-693",
"description": "CWE-693",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-21T18:36:05",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20201021 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
}
],
"source": {
"advisory": "cisco-sa-fxos-sbbyp-KqP6NgrE",
"defect": [
[
"CSCvt31177",
"CSCvt31178"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-10-21T16:00:00",
"ID": "CVE-2020-3458",
"STATE": "PUBLIC",
"TITLE": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Adaptive Security Appliance (ASA) Software",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "6.7",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-693"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20201021 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
}
]
},
"source": {
"advisory": "cisco-sa-fxos-sbbyp-KqP6NgrE",
"defect": [
[
"CSCvt31177",
"CSCvt31178"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3458",
"datePublished": "2020-10-21T18:36:05.376490Z",
"dateReserved": "2019-12-12T00:00:00",
"dateUpdated": "2024-11-13T17:49:16.063Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-3458\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2020-10-21T19:15:16.450\",\"lastModified\":\"2024-11-21T05:31:06.670\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades en el proceso de inicio seguro de Cisco Adaptive Security Appliance (ASA) Software y Firepower Threat Defense (FTD) Software para Dispositivos Firepower 1000 Series y Firepower 2100 Series podr\u00edan permitir a un atacante local autenticado omitir el mecanismo de inicio seguro.\u0026#xa0;Las vulnerabilidades son debido a protecciones insuficientes del proceso de arranque seguro.\u0026#xa0;Un atacante podr\u00eda explotar estas vulnerabilidades inyectando c\u00f3digo en archivos espec\u00edficos a los que luego se hace referencia durante el proceso de inicio del dispositivo.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante romper la cadena de confianza e inyectar c\u00f3digo en el proceso de arranque del dispositivo, que se ejecutar\u00eda en cada arranque y mantendr\u00eda la persistencia entre los reinicios\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-693\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.8.0\",\"versionEndExcluding\":\"9.8.4.26\",\"matchCriteriaId\":\"E38D6F74-E407-4232-86C9-178AC3D00F1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.9.0\",\"versionEndExcluding\":\"9.9.2.80\",\"matchCriteriaId\":\"E16D2CA3-B494-4348-BF0C-03969D1423D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.10.0\",\"versionEndExcluding\":\"9.10.1.43\",\"matchCriteriaId\":\"7036D010-F764-4899-A7B3-456084FC1392\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.12.0\",\"versionEndExcluding\":\"9.12.4.3\",\"matchCriteriaId\":\"88977C36-3EF9-44FD-8406-2A223A8FDF4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.13.0\",\"versionEndExcluding\":\"9.13.1.13\",\"matchCriteriaId\":\"A4148D30-F285-4045-A017-82F5BF074233\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.14.0\",\"versionEndExcluding\":\"9.14.1.15\",\"matchCriteriaId\":\"8353B0CD-5C3F-4F18-966B-DB43DA92838E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_1010:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"018CB46C-D151-4D5C-9ED8-D5F57E2723CF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFE3880-4B85-4E23-9836-70875D5109F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"727A02E8-40A1-4DFE-A3A2-91D628D3044F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19F6546E-28F4-40DC-97D6-E0E023FE939B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB3B0EC3-4654-4D90-9D41-7EC2AD1DDF99\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D96810-5F79-4A83-B8CA-D015790FCF72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16FE2945-4975-4003-AE48-7E134E167A7F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCE7122A-5AA7-4ECD-B024-E27C9D0CFB7B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"976901BF-C52C-4F81-956A-711AF8A60140\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.2.2\",\"matchCriteriaId\":\"2330600D-6AB1-4912-A595-2AE167853B93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.3.0\",\"versionEndExcluding\":\"6.3.0.6\",\"matchCriteriaId\":\"9D27DE97-510A-4761-8184-6940745B54E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4.0\",\"versionEndExcluding\":\"6.4.0.10\",\"matchCriteriaId\":\"53C69C8B-5A19-4613-8861-683CF21806B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.0\",\"versionEndExcluding\":\"6.5.0.5\",\"matchCriteriaId\":\"3ED0E59C-146C-494F-AD46-F6FB43F9C575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD69468-8067-4A5D-B2B0-EC510D889AA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFE3880-4B85-4E23-9836-70875D5109F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"727A02E8-40A1-4DFE-A3A2-91D628D3044F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19F6546E-28F4-40DC-97D6-E0E023FE939B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB3B0EC3-4654-4D90-9D41-7EC2AD1DDF99\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D96810-5F79-4A83-B8CA-D015790FCF72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16FE2945-4975-4003-AE48-7E134E167A7F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCE7122A-5AA7-4ECD-B024-E27C9D0CFB7B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"976901BF-C52C-4F81-956A-711AF8A60140\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE\", \"name\": \"20201021 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T07:37:54.379Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-3458\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-13T17:17:23.563766Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-13T17:19:44.614Z\"}}], \"cna\": {\"title\": \"Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities\", \"source\": {\"defect\": [[\"CSCvt31177\", \"CSCvt31178\"]], \"advisory\": \"cisco-sa-fxos-sbbyp-KqP6NgrE\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 6.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Adaptive Security Appliance (ASA) Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"datePublic\": \"2020-10-21T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE\", \"name\": \"20201021 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-693\", \"description\": \"CWE-693\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2020-10-21T18:36:05\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"6.7\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\"}}, \"source\": {\"defect\": [[\"CSCvt31177\", \"CSCvt31178\"]], \"advisory\": \"cisco-sa-fxos-sbbyp-KqP6NgrE\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"Cisco Adaptive Security Appliance (ASA) Software\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE\", \"name\": \"20201021 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities\", \"refsource\": \"CISCO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-693\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-3458\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2020-10-21T16:00:00\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2020-3458\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-13T17:49:16.063Z\", \"dateReserved\": \"2019-12-12T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2020-10-21T18:36:05.376490Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
cnvd-2021-44681
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE
| Name | ['Cisco Adaptive Security Appliance (ASA)', 'Cisco Firepower Threat Defense null'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-3458",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-3458"
}
},
"description": "Cisco Firepower Threat Defense\u548cCisco Adaptive Security Appliance\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Cisco Firepower Threat Defense\u662f\u4e00\u5957\u63d0\u4f9b\u4e0b\u4e00\u4ee3\u9632\u706b\u5899\u670d\u52a1\u7684\u7edf\u4e00\u8f6f\u4ef6\u3002Cisco Adaptive Security Appliance\u662f\u4e00\u5957\u9632\u706b\u5899\u548c\u7f51\u7edc\u5b89\u5168\u5e73\u53f0\u3002\u8be5\u5e73\u53f0\u63d0\u4f9b\u4e86\u5bf9\u6570\u636e\u548c\u7f51\u7edc\u8d44\u6e90\u7684\u9ad8\u5ea6\u5b89\u5168\u7684\u8bbf\u95ee\u7b49\u529f\u80fd\u3002\n\nCisco Adaptive Security Appliance\u548cFirepower Threat Defense\u5b58\u5728\u5b89\u5168\u542f\u52a8\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6253\u7834\u4fe1\u4efb\u94fe\u5e76\u5c06\u4ee3\u7801\u6ce8\u5165\u8bbe\u5907\u7684\u542f\u52a8\u8fc7\u7a0b\uff0c\u8be5\u8fc7\u7a0b\u5c06\u5728\u6bcf\u6b21\u542f\u52a8\u65f6\u6267\u884c\u5e76\u5728\u91cd\u542f\u540e\u4fdd\u6301\u6301\u4e45\u6027\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-44681",
"openTime": "2021-06-24",
"patchDescription": "Cisco Firepower Threat Defense\u548cCisco Adaptive Security Appliance\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Cisco Firepower Threat Defense\u662f\u4e00\u5957\u63d0\u4f9b\u4e0b\u4e00\u4ee3\u9632\u706b\u5899\u670d\u52a1\u7684\u7edf\u4e00\u8f6f\u4ef6\u3002Cisco Adaptive Security Appliance\u662f\u4e00\u5957\u9632\u706b\u5899\u548c\u7f51\u7edc\u5b89\u5168\u5e73\u53f0\u3002\u8be5\u5e73\u53f0\u63d0\u4f9b\u4e86\u5bf9\u6570\u636e\u548c\u7f51\u7edc\u8d44\u6e90\u7684\u9ad8\u5ea6\u5b89\u5168\u7684\u8bbf\u95ee\u7b49\u529f\u80fd\u3002\r\n\r\nCisco Adaptive Security Appliance\u548cFirepower Threat Defense\u5b58\u5728\u5b89\u5168\u542f\u52a8\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6253\u7834\u4fe1\u4efb\u94fe\u5e76\u5c06\u4ee3\u7801\u6ce8\u5165\u8bbe\u5907\u7684\u542f\u52a8\u8fc7\u7a0b\uff0c\u8be5\u8fc7\u7a0b\u5c06\u5728\u6bcf\u6b21\u542f\u52a8\u65f6\u6267\u884c\u5e76\u5728\u91cd\u542f\u540e\u4fdd\u6301\u6301\u4e45\u6027\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco Adaptive Security Appliance\u548cFirepower Threat Defense\u5b89\u5168\u542f\u52a8\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco Adaptive Security Appliance (ASA)",
"Cisco Firepower Threat Defense null"
]
},
"referenceLink": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE",
"serverity": "\u4e2d",
"submitTime": "2020-11-04",
"title": "Cisco Adaptive Security Appliance\u548cFirepower Threat Defense\u5b89\u5168\u542f\u52a8\u7ed5\u8fc7\u6f0f\u6d1e"
}
cisco-sa-fxos-sbbyp-kqp6ngre
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "These vulnerabilities were found during internal security testing."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "Update from October 23, 2020: Cisco has become aware of a new Cisco Adaptive Security Appliance vulnerability that could affect the fixed releases recommended for code trains 9.13 and 9.14 in the Fixed Software [\"#fs\"] section of this advisory. See the Cisco Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy\"] for additional information.\r\n\r\nMultiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism.\r\n\r\nThe vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots.\r\n\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\n",
"title": "Summary"
},
{
"category": "general",
"text": "These vulnerabilities affect Cisco ASA Software and FTD Software when running on the following products:\r\n\r\nFirepower 1000 Series Appliances\r\nFirepower 2100 Series Appliances\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n\r\nFor the Firepower 4100 Series Appliances and Firepower 9300 Series Appliances running FXOS, see the following advisory:\r\n\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn\"]",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that this vulnerability does not affect Cisco Firepower Management Center (FMC) Software.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Fixed Releases\r\nIn the following table(s), the left column lists Cisco software releases and the right column indicates whether a release is affected by the vulnerabilities described in this advisory and the first release that includes the fix for these vulnerabilities.\r\n\r\nASA Software for Firepower 1000 Series and Firepower 2100 Series\r\n Cisco ASA Software Release First Fixed Release for these Vulnerabilities 9.8 9.8.4.26 9.9 9.9.2.80 9.10 9.10.1.43 9.12 9.12.4.3 9.13 9.13.1.13 9.14 9.14.1.15\r\nNote: Firepower 1000 Series Appliances were first supported in ASA Software Release 9.13 and Firepower 2100 Series Appliances were first supported in ASA Software Release 9.8.\r\n\r\nFTD Software for Firepower 1000 Series and Firepower 2100 Series\r\n Cisco FTD Software Release First Fixed Release for these Vulnerabilities Earlier than 6.2.21 Migrate to a fixed release. 6.2.2 Migrate to a fixed release. 6.2.3 Migrate to a fixed release. 6.3.0 6.3.0.6 (future release) 6.4.0 6.4.0.10 6.5.0 6.5.0.5 (future release) 6.6.0 6.6.1\r\nNote: Firepower 1000 Series Appliances were first supported on FTD Software Release 6.4.0 and Firepower 2100 Series appliances were first supported on FTD Software Release 6.2.1.\r\n\r\n1. Cisco FMC and FTD Software releases 6.0.1 and earlier, as well as releases 6.2.0 and 6.2.1, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for these vulnerabilities.\r\n\r\nTo upgrade to a fixed release of Cisco FTD Software, do one of the following:\r\n\r\nFor devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy.\r\nFor devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "These vulnerabilities were found during internal security testing.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
}
],
"title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities",
"tracking": {
"current_release_date": "2020-10-23T13:31:44+00:00",
"generator": {
"date": "2025-10-13T15:39:51+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-fxos-sbbyp-KqP6NgrE",
"initial_release_date": "2020-10-21T16:00:00+00:00",
"revision_history": [
{
"date": "2020-10-21T15:57:08+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2020-10-23T13:31:44+00:00",
"number": "1.1.0",
"summary": "Updated the Summary section to provide information on a new vulnerability affecting fixed release recommendations for code trains 9.13 and 9.14."
}
],
"status": "final",
"version": "1.1.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "9.8.2",
"product": {
"name": "9.8.2",
"product_id": "CSAFPID-232588"
}
},
{
"category": "service_pack",
"name": "9.8.2.8",
"product": {
"name": "9.8.2.8",
"product_id": "CSAFPID-232589"
}
},
{
"category": "service_pack",
"name": "9.8.2.14",
"product": {
"name": "9.8.2.14",
"product_id": "CSAFPID-232897"
}
},
{
"category": "service_pack",
"name": "9.8.2.15",
"product": {
"name": "9.8.2.15",
"product_id": "CSAFPID-232898"
}
},
{
"category": "service_pack",
"name": "9.8.2.17",
"product": {
"name": "9.8.2.17",
"product_id": "CSAFPID-232899"
}
},
{
"category": "service_pack",
"name": "9.8.2.20",
"product": {
"name": "9.8.2.20",
"product_id": "CSAFPID-232902"
}
},
{
"category": "service_pack",
"name": "9.8.2.24",
"product": {
"name": "9.8.2.24",
"product_id": "CSAFPID-239005"
}
},
{
"category": "service_pack",
"name": "9.8.2.26",
"product": {
"name": "9.8.2.26",
"product_id": "CSAFPID-239006"
}
},
{
"category": "service_pack",
"name": "9.8.2.28",
"product": {
"name": "9.8.2.28",
"product_id": "CSAFPID-248821"
}
},
{
"category": "service_pack",
"name": "9.8.2.33",
"product": {
"name": "9.8.2.33",
"product_id": "CSAFPID-248822"
}
},
{
"category": "service_pack",
"name": "9.8.2.35",
"product": {
"name": "9.8.2.35",
"product_id": "CSAFPID-248823"
}
},
{
"category": "service_pack",
"name": "9.8.2.38",
"product": {
"name": "9.8.2.38",
"product_id": "CSAFPID-248824"
}
},
{
"category": "service_pack",
"name": "9.8.3.8",
"product": {
"name": "9.8.3.8",
"product_id": "CSAFPID-248825"
}
},
{
"category": "service_pack",
"name": "9.8.3.11",
"product": {
"name": "9.8.3.11",
"product_id": "CSAFPID-248826"
}
},
{
"category": "service_pack",
"name": "9.8.3.14",
"product": {
"name": "9.8.3.14",
"product_id": "CSAFPID-248827"
}
},
{
"category": "service_pack",
"name": "9.8.3.16",
"product": {
"name": "9.8.3.16",
"product_id": "CSAFPID-251745"
}
},
{
"category": "service_pack",
"name": "9.8.3.18",
"product": {
"name": "9.8.3.18",
"product_id": "CSAFPID-255556"
}
},
{
"category": "service_pack",
"name": "9.8.3.21",
"product": {
"name": "9.8.3.21",
"product_id": "CSAFPID-255557"
}
},
{
"category": "service_pack",
"name": "9.8.3",
"product": {
"name": "9.8.3",
"product_id": "CSAFPID-255929"
}
},
{
"category": "service_pack",
"name": "9.8.3.26",
"product": {
"name": "9.8.3.26",
"product_id": "CSAFPID-265020"
}
},
{
"category": "service_pack",
"name": "9.8.3.29",
"product": {
"name": "9.8.3.29",
"product_id": "CSAFPID-265021"
}
},
{
"category": "service_pack",
"name": "9.8.4",
"product": {
"name": "9.8.4",
"product_id": "CSAFPID-265022"
}
},
{
"category": "service_pack",
"name": "9.8.4.3",
"product": {
"name": "9.8.4.3",
"product_id": "CSAFPID-266069"
}
},
{
"category": "service_pack",
"name": "9.8.4.7",
"product": {
"name": "9.8.4.7",
"product_id": "CSAFPID-268477"
}
},
{
"category": "service_pack",
"name": "9.8.4.8",
"product": {
"name": "9.8.4.8",
"product_id": "CSAFPID-276357"
}
},
{
"category": "service_pack",
"name": "9.8.4.10",
"product": {
"name": "9.8.4.10",
"product_id": "CSAFPID-276358"
}
},
{
"category": "service_pack",
"name": "9.8.4.12",
"product": {
"name": "9.8.4.12",
"product_id": "CSAFPID-276359"
}
},
{
"category": "service_pack",
"name": "9.8.4.15",
"product": {
"name": "9.8.4.15",
"product_id": "CSAFPID-276930"
}
},
{
"category": "service_pack",
"name": "9.8.4.17",
"product": {
"name": "9.8.4.17",
"product_id": "CSAFPID-277312"
}
},
{
"category": "service_pack",
"name": "9.8.4.25",
"product": {
"name": "9.8.4.25",
"product_id": "CSAFPID-278502"
}
},
{
"category": "service_pack",
"name": "9.8.4.20",
"product": {
"name": "9.8.4.20",
"product_id": "CSAFPID-278713"
}
},
{
"category": "service_pack",
"name": "9.8.4.22",
"product": {
"name": "9.8.4.22",
"product_id": "CSAFPID-278714"
}
}
],
"category": "product_version",
"name": "9.8"
},
{
"branches": [
{
"category": "service_pack",
"name": "9.12.1",
"product": {
"name": "9.12.1",
"product_id": "CSAFPID-255564"
}
},
{
"category": "service_pack",
"name": "9.12.1.2",
"product": {
"name": "9.12.1.2",
"product_id": "CSAFPID-265028"
}
},
{
"category": "service_pack",
"name": "9.12.1.3",
"product": {
"name": "9.12.1.3",
"product_id": "CSAFPID-265029"
}
},
{
"category": "service_pack",
"name": "9.12.2",
"product": {
"name": "9.12.2",
"product_id": "CSAFPID-268481"
}
},
{
"category": "service_pack",
"name": "9.12.2.5",
"product": {
"name": "9.12.2.5",
"product_id": "CSAFPID-276367"
}
},
{
"category": "service_pack",
"name": "9.12.2.9",
"product": {
"name": "9.12.2.9",
"product_id": "CSAFPID-276368"
}
},
{
"category": "service_pack",
"name": "9.12.3",
"product": {
"name": "9.12.3",
"product_id": "CSAFPID-276369"
}
},
{
"category": "service_pack",
"name": "9.12.3.2",
"product": {
"name": "9.12.3.2",
"product_id": "CSAFPID-276931"
}
},
{
"category": "service_pack",
"name": "9.12.3.7",
"product": {
"name": "9.12.3.7",
"product_id": "CSAFPID-277325"
}
},
{
"category": "service_pack",
"name": "9.12.4",
"product": {
"name": "9.12.4",
"product_id": "CSAFPID-278378"
}
},
{
"category": "service_pack",
"name": "9.12.3.12",
"product": {
"name": "9.12.3.12",
"product_id": "CSAFPID-278716"
}
},
{
"category": "service_pack",
"name": "9.12.3.9",
"product": {
"name": "9.12.3.9",
"product_id": "CSAFPID-278718"
}
},
{
"category": "service_pack",
"name": "9.12.2.1",
"product": {
"name": "9.12.2.1",
"product_id": "CSAFPID-278719"
}
},
{
"category": "service_pack",
"name": "9.12.4.2",
"product": {
"name": "9.12.4.2",
"product_id": "CSAFPID-278752"
}
}
],
"category": "product_version",
"name": "9.12"
},
{
"branches": [
{
"category": "service_pack",
"name": "9.14.1",
"product": {
"name": "9.14.1",
"product_id": "CSAFPID-278380"
}
},
{
"category": "service_pack",
"name": "9.14.1.10",
"product": {
"name": "9.14.1.10",
"product_id": "CSAFPID-278725"
}
}
],
"category": "product_version",
"name": "9.14"
}
],
"category": "product_family",
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software"
},
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "6.2.3",
"product": {
"name": "6.2.3",
"product_id": "CSAFPID-233334"
}
},
{
"category": "service_pack",
"name": "6.2.3.1",
"product": {
"name": "6.2.3.1",
"product_id": "CSAFPID-245396"
}
},
{
"category": "service_pack",
"name": "6.2.3.2",
"product": {
"name": "6.2.3.2",
"product_id": "CSAFPID-245397"
}
},
{
"category": "service_pack",
"name": "6.2.3.3",
"product": {
"name": "6.2.3.3",
"product_id": "CSAFPID-245398"
}
},
{
"category": "service_pack",
"name": "6.2.3.4",
"product": {
"name": "6.2.3.4",
"product_id": "CSAFPID-247893"
}
},
{
"category": "service_pack",
"name": "6.2.3.5",
"product": {
"name": "6.2.3.5",
"product_id": "CSAFPID-247894"
}
},
{
"category": "service_pack",
"name": "6.2.3.6",
"product": {
"name": "6.2.3.6",
"product_id": "CSAFPID-248816"
}
},
{
"category": "service_pack",
"name": "6.2.3.7",
"product": {
"name": "6.2.3.7",
"product_id": "CSAFPID-251756"
}
},
{
"category": "service_pack",
"name": "6.2.3.8",
"product": {
"name": "6.2.3.8",
"product_id": "CSAFPID-251757"
}
},
{
"category": "service_pack",
"name": "6.2.3.10",
"product": {
"name": "6.2.3.10",
"product_id": "CSAFPID-258063"
}
},
{
"category": "service_pack",
"name": "6.2.3.11",
"product": {
"name": "6.2.3.11",
"product_id": "CSAFPID-258064"
}
},
{
"category": "service_pack",
"name": "6.2.3.9",
"product": {
"name": "6.2.3.9",
"product_id": "CSAFPID-258915"
}
},
{
"category": "service_pack",
"name": "6.2.3.12",
"product": {
"name": "6.2.3.12",
"product_id": "CSAFPID-265011"
}
},
{
"category": "service_pack",
"name": "6.2.3.13",
"product": {
"name": "6.2.3.13",
"product_id": "CSAFPID-267675"
}
},
{
"category": "service_pack",
"name": "6.2.3.14",
"product": {
"name": "6.2.3.14",
"product_id": "CSAFPID-267676"
}
},
{
"category": "service_pack",
"name": "6.2.3.15",
"product": {
"name": "6.2.3.15",
"product_id": "CSAFPID-275475"
}
},
{
"category": "service_pack",
"name": "6.2.3.16",
"product": {
"name": "6.2.3.16",
"product_id": "CSAFPID-278503"
}
}
],
"category": "product_version",
"name": "6.2"
},
{
"branches": [
{
"category": "service_pack",
"name": "6.6.0",
"product": {
"name": "6.6.0",
"product_id": "CSAFPID-225862"
}
},
{
"category": "service_pack",
"name": "6.6.0.1",
"product": {
"name": "6.6.0.1",
"product_id": "CSAFPID-278885"
}
}
],
"category": "product_version",
"name": "6.6"
},
{
"branches": [
{
"category": "service_pack",
"name": "6.4.0",
"product": {
"name": "6.4.0",
"product_id": "CSAFPID-265014"
}
},
{
"category": "service_pack",
"name": "6.4.0.1",
"product": {
"name": "6.4.0.1",
"product_id": "CSAFPID-265015"
}
},
{
"category": "service_pack",
"name": "6.4.0.3",
"product": {
"name": "6.4.0.3",
"product_id": "CSAFPID-265950"
}
},
{
"category": "service_pack",
"name": "6.4.0.2",
"product": {
"name": "6.4.0.2",
"product_id": "CSAFPID-268602"
}
},
{
"category": "service_pack",
"name": "6.4.0.4",
"product": {
"name": "6.4.0.4",
"product_id": "CSAFPID-276372"
}
},
{
"category": "service_pack",
"name": "6.4.0.5",
"product": {
"name": "6.4.0.5",
"product_id": "CSAFPID-276373"
}
},
{
"category": "service_pack",
"name": "6.4.0.6",
"product": {
"name": "6.4.0.6",
"product_id": "CSAFPID-276933"
}
},
{
"category": "service_pack",
"name": "6.4.0.7",
"product": {
"name": "6.4.0.7",
"product_id": "CSAFPID-276934"
}
},
{
"category": "service_pack",
"name": "6.4.0.8",
"product": {
"name": "6.4.0.8",
"product_id": "CSAFPID-276935"
}
},
{
"category": "service_pack",
"name": "6.4.0.9",
"product": {
"name": "6.4.0.9",
"product_id": "CSAFPID-278397"
}
}
],
"category": "product_version",
"name": "6.4"
}
],
"category": "product_family",
"name": "Cisco Secure Firewall Threat Defense (FTD) Software"
},
{
"category": "product_name",
"name": "Cisco Firepower 2100 Series",
"product": {
"name": "Cisco Firepower 2100 Series",
"product_id": "CSAFPID-277392"
}
},
{
"category": "product_name",
"name": "Cisco Firepower 1000 Series",
"product": {
"name": "Cisco Firepower 1000 Series",
"product_id": "CSAFPID-277393"
}
}
],
"category": "vendor",
"name": "Cisco"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232588:277392"
},
"product_reference": "CSAFPID-232588",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.8 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232589:277392"
},
"product_reference": "CSAFPID-232589",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.14 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232897:277392"
},
"product_reference": "CSAFPID-232897",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.15 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232898:277392"
},
"product_reference": "CSAFPID-232898",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.17 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232899:277392"
},
"product_reference": "CSAFPID-232899",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.20 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232902:277392"
},
"product_reference": "CSAFPID-232902",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.24 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-239005:277392"
},
"product_reference": "CSAFPID-239005",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.26 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-239006:277392"
},
"product_reference": "CSAFPID-239006",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.28 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248821:277392"
},
"product_reference": "CSAFPID-248821",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.33 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248822:277392"
},
"product_reference": "CSAFPID-248822",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.35 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248823:277392"
},
"product_reference": "CSAFPID-248823",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.38 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248824:277392"
},
"product_reference": "CSAFPID-248824",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.8 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248825:277392"
},
"product_reference": "CSAFPID-248825",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.11 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248826:277392"
},
"product_reference": "CSAFPID-248826",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.14 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248827:277392"
},
"product_reference": "CSAFPID-248827",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.16 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-251745:277392"
},
"product_reference": "CSAFPID-251745",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.18 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-255556:277392"
},
"product_reference": "CSAFPID-255556",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.21 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-255557:277392"
},
"product_reference": "CSAFPID-255557",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-255929:277392"
},
"product_reference": "CSAFPID-255929",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.26 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265020:277392"
},
"product_reference": "CSAFPID-265020",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.29 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265021:277392"
},
"product_reference": "CSAFPID-265021",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265022:277392"
},
"product_reference": "CSAFPID-265022",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-266069:277392"
},
"product_reference": "CSAFPID-266069",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.7 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-268477:277392"
},
"product_reference": "CSAFPID-268477",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.8 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276357:277392"
},
"product_reference": "CSAFPID-276357",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.10 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276358:277392"
},
"product_reference": "CSAFPID-276358",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.12 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276359:277392"
},
"product_reference": "CSAFPID-276359",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.15 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276930:277392"
},
"product_reference": "CSAFPID-276930",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.17 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-277312:277392"
},
"product_reference": "CSAFPID-277312",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.25 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278502:277392"
},
"product_reference": "CSAFPID-278502",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.20 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278713:277392"
},
"product_reference": "CSAFPID-278713",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.22 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278714:277392"
},
"product_reference": "CSAFPID-278714",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-255564:277392"
},
"product_reference": "CSAFPID-255564",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265028:277392"
},
"product_reference": "CSAFPID-265028",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265029:277392"
},
"product_reference": "CSAFPID-265029",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-268481:277392"
},
"product_reference": "CSAFPID-268481",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.2.5 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276367:277392"
},
"product_reference": "CSAFPID-276367",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.2.9 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276368:277392"
},
"product_reference": "CSAFPID-276368",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276369:277392"
},
"product_reference": "CSAFPID-276369",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.3.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276931:277392"
},
"product_reference": "CSAFPID-276931",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.3.7 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-277325:277392"
},
"product_reference": "CSAFPID-277325",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.4 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278378:277392"
},
"product_reference": "CSAFPID-278378",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.3.12 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278716:277392"
},
"product_reference": "CSAFPID-278716",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.3.9 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278718:277392"
},
"product_reference": "CSAFPID-278718",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.2.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278719:277392"
},
"product_reference": "CSAFPID-278719",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.4.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278752:277392"
},
"product_reference": "CSAFPID-278752",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278380:277392"
},
"product_reference": "CSAFPID-278380",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-278380:277393"
},
"product_reference": "CSAFPID-278380",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278725:277392"
},
"product_reference": "CSAFPID-278725",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-278725:277393"
},
"product_reference": "CSAFPID-278725",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-233334:277392"
},
"product_reference": "CSAFPID-233334",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-245396:277392"
},
"product_reference": "CSAFPID-245396",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-245397:277392"
},
"product_reference": "CSAFPID-245397",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-245398:277392"
},
"product_reference": "CSAFPID-245398",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.4 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-247893:277392"
},
"product_reference": "CSAFPID-247893",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.5 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-247894:277392"
},
"product_reference": "CSAFPID-247894",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.6 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248816:277392"
},
"product_reference": "CSAFPID-248816",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.7 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-251756:277392"
},
"product_reference": "CSAFPID-251756",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.8 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-251757:277392"
},
"product_reference": "CSAFPID-251757",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.10 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-258063:277392"
},
"product_reference": "CSAFPID-258063",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.11 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-258064:277392"
},
"product_reference": "CSAFPID-258064",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.9 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-258915:277392"
},
"product_reference": "CSAFPID-258915",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.12 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265011:277392"
},
"product_reference": "CSAFPID-265011",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.13 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-267675:277392"
},
"product_reference": "CSAFPID-267675",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.14 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-267676:277392"
},
"product_reference": "CSAFPID-267676",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.15 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-275475:277392"
},
"product_reference": "CSAFPID-275475",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.16 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278503:277392"
},
"product_reference": "CSAFPID-278503",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.6.0 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-225862:277392"
},
"product_reference": "CSAFPID-225862",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.6.0 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-225862:277393"
},
"product_reference": "CSAFPID-225862",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.6.0.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278885:277392"
},
"product_reference": "CSAFPID-278885",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.6.0.1 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-278885:277393"
},
"product_reference": "CSAFPID-278885",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265014:277392"
},
"product_reference": "CSAFPID-265014",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-265014:277393"
},
"product_reference": "CSAFPID-265014",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265015:277392"
},
"product_reference": "CSAFPID-265015",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265950:277392"
},
"product_reference": "CSAFPID-265950",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.3 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-265950:277393"
},
"product_reference": "CSAFPID-265950",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-268602:277392"
},
"product_reference": "CSAFPID-268602",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.2 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-268602:277393"
},
"product_reference": "CSAFPID-268602",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.4 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276372:277392"
},
"product_reference": "CSAFPID-276372",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.4 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-276372:277393"
},
"product_reference": "CSAFPID-276372",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.5 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276373:277392"
},
"product_reference": "CSAFPID-276373",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.5 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-276373:277393"
},
"product_reference": "CSAFPID-276373",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.6 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276933:277392"
},
"product_reference": "CSAFPID-276933",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.6 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-276933:277393"
},
"product_reference": "CSAFPID-276933",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.7 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276934:277392"
},
"product_reference": "CSAFPID-276934",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.7 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-276934:277393"
},
"product_reference": "CSAFPID-276934",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.8 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276935:277392"
},
"product_reference": "CSAFPID-276935",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.8 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-276935:277393"
},
"product_reference": "CSAFPID-276935",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.9 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278397:277392"
},
"product_reference": "CSAFPID-278397",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.9 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-278397:277393"
},
"product_reference": "CSAFPID-278397",
"relates_to_product_reference": "CSAFPID-277393"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-3458",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvt31178"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvt31177"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-232588:277392",
"CSAFPID-232589:277392",
"CSAFPID-232897:277392",
"CSAFPID-232898:277392",
"CSAFPID-232899:277392",
"CSAFPID-232902:277392",
"CSAFPID-239005:277392",
"CSAFPID-239006:277392",
"CSAFPID-248821:277392",
"CSAFPID-248822:277392",
"CSAFPID-248823:277392",
"CSAFPID-248824:277392",
"CSAFPID-248825:277392",
"CSAFPID-248826:277392",
"CSAFPID-248827:277392",
"CSAFPID-251745:277392",
"CSAFPID-255556:277392",
"CSAFPID-255557:277392",
"CSAFPID-255564:277392",
"CSAFPID-255929:277392",
"CSAFPID-265020:277392",
"CSAFPID-265021:277392",
"CSAFPID-265022:277392",
"CSAFPID-265028:277392",
"CSAFPID-265029:277392",
"CSAFPID-266069:277392",
"CSAFPID-268477:277392",
"CSAFPID-268481:277392",
"CSAFPID-276357:277392",
"CSAFPID-276358:277392",
"CSAFPID-276359:277392",
"CSAFPID-276367:277392",
"CSAFPID-276368:277392",
"CSAFPID-276369:277392",
"CSAFPID-276930:277392",
"CSAFPID-276931:277392",
"CSAFPID-277312:277392",
"CSAFPID-277325:277392",
"CSAFPID-278378:277392",
"CSAFPID-278380:277392",
"CSAFPID-278380:277393",
"CSAFPID-278502:277392",
"CSAFPID-278713:277392",
"CSAFPID-278714:277392",
"CSAFPID-278716:277392",
"CSAFPID-278718:277392",
"CSAFPID-278719:277392",
"CSAFPID-278725:277392",
"CSAFPID-278725:277393",
"CSAFPID-278752:277392",
"CSAFPID-225862:277392",
"CSAFPID-225862:277393",
"CSAFPID-233334:277392",
"CSAFPID-245396:277392",
"CSAFPID-245397:277392",
"CSAFPID-245398:277392",
"CSAFPID-247893:277392",
"CSAFPID-247894:277392",
"CSAFPID-248816:277392",
"CSAFPID-251756:277392",
"CSAFPID-251757:277392",
"CSAFPID-258063:277392",
"CSAFPID-258064:277392",
"CSAFPID-258915:277392",
"CSAFPID-265011:277392",
"CSAFPID-265014:277392",
"CSAFPID-265014:277393",
"CSAFPID-265015:277392",
"CSAFPID-265950:277392",
"CSAFPID-265950:277393",
"CSAFPID-267675:277392",
"CSAFPID-267676:277392",
"CSAFPID-268602:277392",
"CSAFPID-268602:277393",
"CSAFPID-275475:277392",
"CSAFPID-276372:277392",
"CSAFPID-276372:277393",
"CSAFPID-276373:277392",
"CSAFPID-276373:277393",
"CSAFPID-276933:277392",
"CSAFPID-276933:277393",
"CSAFPID-276934:277392",
"CSAFPID-276934:277393",
"CSAFPID-276935:277392",
"CSAFPID-276935:277393",
"CSAFPID-278397:277392",
"CSAFPID-278397:277393",
"CSAFPID-278503:277392",
"CSAFPID-278885:277392",
"CSAFPID-278885:277393"
]
},
"release_date": "2020-10-21T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-225862:277392",
"CSAFPID-225862:277393",
"CSAFPID-233334:277392",
"CSAFPID-245396:277392",
"CSAFPID-245397:277392",
"CSAFPID-245398:277392",
"CSAFPID-247893:277392",
"CSAFPID-247894:277392",
"CSAFPID-248816:277392",
"CSAFPID-251756:277392",
"CSAFPID-251757:277392",
"CSAFPID-258063:277392",
"CSAFPID-258064:277392",
"CSAFPID-258915:277392",
"CSAFPID-265011:277392",
"CSAFPID-265014:277392",
"CSAFPID-265014:277393",
"CSAFPID-265015:277392",
"CSAFPID-265950:277392",
"CSAFPID-265950:277393",
"CSAFPID-267675:277392",
"CSAFPID-267676:277392",
"CSAFPID-268602:277392",
"CSAFPID-268602:277393",
"CSAFPID-275475:277392",
"CSAFPID-276372:277392",
"CSAFPID-276372:277393",
"CSAFPID-276373:277392",
"CSAFPID-276373:277393",
"CSAFPID-276933:277392",
"CSAFPID-276933:277393",
"CSAFPID-276934:277392",
"CSAFPID-276934:277393",
"CSAFPID-276935:277392",
"CSAFPID-276935:277393",
"CSAFPID-278397:277392",
"CSAFPID-278397:277393",
"CSAFPID-278503:277392",
"CSAFPID-278885:277392",
"CSAFPID-278885:277393",
"CSAFPID-232588:277392",
"CSAFPID-232589:277392",
"CSAFPID-232897:277392",
"CSAFPID-232898:277392",
"CSAFPID-232899:277392",
"CSAFPID-232902:277392",
"CSAFPID-239005:277392",
"CSAFPID-239006:277392",
"CSAFPID-248821:277392",
"CSAFPID-248822:277392",
"CSAFPID-248823:277392",
"CSAFPID-248824:277392",
"CSAFPID-248825:277392",
"CSAFPID-248826:277392",
"CSAFPID-248827:277392",
"CSAFPID-251745:277392",
"CSAFPID-255556:277392",
"CSAFPID-255557:277392",
"CSAFPID-255564:277392",
"CSAFPID-255929:277392",
"CSAFPID-265020:277392",
"CSAFPID-265021:277392",
"CSAFPID-265022:277392",
"CSAFPID-265028:277392",
"CSAFPID-265029:277392",
"CSAFPID-266069:277392",
"CSAFPID-268477:277392",
"CSAFPID-268481:277392",
"CSAFPID-276357:277392",
"CSAFPID-276358:277392",
"CSAFPID-276359:277392",
"CSAFPID-276367:277392",
"CSAFPID-276368:277392",
"CSAFPID-276369:277392",
"CSAFPID-276930:277392",
"CSAFPID-276931:277392",
"CSAFPID-277312:277392",
"CSAFPID-277325:277392",
"CSAFPID-278378:277392",
"CSAFPID-278380:277392",
"CSAFPID-278380:277393",
"CSAFPID-278502:277392",
"CSAFPID-278713:277392",
"CSAFPID-278714:277392",
"CSAFPID-278716:277392",
"CSAFPID-278718:277392",
"CSAFPID-278719:277392",
"CSAFPID-278725:277392",
"CSAFPID-278725:277393",
"CSAFPID-278752:277392"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-232588:277392",
"CSAFPID-232589:277392",
"CSAFPID-232897:277392",
"CSAFPID-232898:277392",
"CSAFPID-232899:277392",
"CSAFPID-232902:277392",
"CSAFPID-239005:277392",
"CSAFPID-239006:277392",
"CSAFPID-248821:277392",
"CSAFPID-248822:277392",
"CSAFPID-248823:277392",
"CSAFPID-248824:277392",
"CSAFPID-248825:277392",
"CSAFPID-248826:277392",
"CSAFPID-248827:277392",
"CSAFPID-251745:277392",
"CSAFPID-255556:277392",
"CSAFPID-255557:277392",
"CSAFPID-255564:277392",
"CSAFPID-255929:277392",
"CSAFPID-265020:277392",
"CSAFPID-265021:277392",
"CSAFPID-265022:277392",
"CSAFPID-265028:277392",
"CSAFPID-265029:277392",
"CSAFPID-266069:277392",
"CSAFPID-268477:277392",
"CSAFPID-268481:277392",
"CSAFPID-276357:277392",
"CSAFPID-276358:277392",
"CSAFPID-276359:277392",
"CSAFPID-276367:277392",
"CSAFPID-276368:277392",
"CSAFPID-276369:277392",
"CSAFPID-276930:277392",
"CSAFPID-276931:277392",
"CSAFPID-277312:277392",
"CSAFPID-277325:277392",
"CSAFPID-278378:277392",
"CSAFPID-278380:277392",
"CSAFPID-278380:277393",
"CSAFPID-278502:277392",
"CSAFPID-278713:277392",
"CSAFPID-278714:277392",
"CSAFPID-278716:277392",
"CSAFPID-278718:277392",
"CSAFPID-278719:277392",
"CSAFPID-278725:277392",
"CSAFPID-278725:277393",
"CSAFPID-278752:277392",
"CSAFPID-225862:277392",
"CSAFPID-225862:277393",
"CSAFPID-233334:277392",
"CSAFPID-245396:277392",
"CSAFPID-245397:277392",
"CSAFPID-245398:277392",
"CSAFPID-247893:277392",
"CSAFPID-247894:277392",
"CSAFPID-248816:277392",
"CSAFPID-251756:277392",
"CSAFPID-251757:277392",
"CSAFPID-258063:277392",
"CSAFPID-258064:277392",
"CSAFPID-258915:277392",
"CSAFPID-265011:277392",
"CSAFPID-265014:277392",
"CSAFPID-265014:277393",
"CSAFPID-265015:277392",
"CSAFPID-265950:277392",
"CSAFPID-265950:277393",
"CSAFPID-267675:277392",
"CSAFPID-267676:277392",
"CSAFPID-268602:277392",
"CSAFPID-268602:277393",
"CSAFPID-275475:277392",
"CSAFPID-276372:277392",
"CSAFPID-276372:277393",
"CSAFPID-276373:277392",
"CSAFPID-276373:277393",
"CSAFPID-276933:277392",
"CSAFPID-276933:277393",
"CSAFPID-276934:277392",
"CSAFPID-276934:277393",
"CSAFPID-276935:277392",
"CSAFPID-276935:277393",
"CSAFPID-278397:277392",
"CSAFPID-278397:277393",
"CSAFPID-278503:277392",
"CSAFPID-278885:277392",
"CSAFPID-278885:277393"
]
}
],
"title": "Cisco FXOS Software for Firepower 1000/2100 Series Appliance Secure Boot Bypass Vulnerability"
}
]
}
cisco-sa-fxos-sbbyp-KqP6NgrE
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "These vulnerabilities were found during internal security testing."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "Update from October 23, 2020: Cisco has become aware of a new Cisco Adaptive Security Appliance vulnerability that could affect the fixed releases recommended for code trains 9.13 and 9.14 in the Fixed Software [\"#fs\"] section of this advisory. See the Cisco Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy\"] for additional information.\r\n\r\nMultiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism.\r\n\r\nThe vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots.\r\n\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\n",
"title": "Summary"
},
{
"category": "general",
"text": "These vulnerabilities affect Cisco ASA Software and FTD Software when running on the following products:\r\n\r\nFirepower 1000 Series Appliances\r\nFirepower 2100 Series Appliances\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n\r\nFor the Firepower 4100 Series Appliances and Firepower 9300 Series Appliances running FXOS, see the following advisory:\r\n\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn\"]",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that this vulnerability does not affect Cisco Firepower Management Center (FMC) Software.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Fixed Releases\r\nIn the following table(s), the left column lists Cisco software releases and the right column indicates whether a release is affected by the vulnerabilities described in this advisory and the first release that includes the fix for these vulnerabilities.\r\n\r\nASA Software for Firepower 1000 Series and Firepower 2100 Series\r\n Cisco ASA Software Release First Fixed Release for these Vulnerabilities 9.8 9.8.4.26 9.9 9.9.2.80 9.10 9.10.1.43 9.12 9.12.4.3 9.13 9.13.1.13 9.14 9.14.1.15\r\nNote: Firepower 1000 Series Appliances were first supported in ASA Software Release 9.13 and Firepower 2100 Series Appliances were first supported in ASA Software Release 9.8.\r\n\r\nFTD Software for Firepower 1000 Series and Firepower 2100 Series\r\n Cisco FTD Software Release First Fixed Release for these Vulnerabilities Earlier than 6.2.21 Migrate to a fixed release. 6.2.2 Migrate to a fixed release. 6.2.3 Migrate to a fixed release. 6.3.0 6.3.0.6 (future release) 6.4.0 6.4.0.10 6.5.0 6.5.0.5 (future release) 6.6.0 6.6.1\r\nNote: Firepower 1000 Series Appliances were first supported on FTD Software Release 6.4.0 and Firepower 2100 Series appliances were first supported on FTD Software Release 6.2.1.\r\n\r\n1. Cisco FMC and FTD Software releases 6.0.1 and earlier, as well as releases 6.2.0 and 6.2.1, have reached end of software maintenance. Customers are advised to migrate to a supported release that includes the fix for these vulnerabilities.\r\n\r\nTo upgrade to a fixed release of Cisco FTD Software, do one of the following:\r\n\r\nFor devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy.\r\nFor devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "These vulnerabilities were found during internal security testing.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
}
],
"title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities",
"tracking": {
"current_release_date": "2020-10-23T13:31:44+00:00",
"generator": {
"date": "2025-10-13T15:39:51+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-fxos-sbbyp-KqP6NgrE",
"initial_release_date": "2020-10-21T16:00:00+00:00",
"revision_history": [
{
"date": "2020-10-21T15:57:08+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2020-10-23T13:31:44+00:00",
"number": "1.1.0",
"summary": "Updated the Summary section to provide information on a new vulnerability affecting fixed release recommendations for code trains 9.13 and 9.14."
}
],
"status": "final",
"version": "1.1.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "9.8.2",
"product": {
"name": "9.8.2",
"product_id": "CSAFPID-232588"
}
},
{
"category": "service_pack",
"name": "9.8.2.8",
"product": {
"name": "9.8.2.8",
"product_id": "CSAFPID-232589"
}
},
{
"category": "service_pack",
"name": "9.8.2.14",
"product": {
"name": "9.8.2.14",
"product_id": "CSAFPID-232897"
}
},
{
"category": "service_pack",
"name": "9.8.2.15",
"product": {
"name": "9.8.2.15",
"product_id": "CSAFPID-232898"
}
},
{
"category": "service_pack",
"name": "9.8.2.17",
"product": {
"name": "9.8.2.17",
"product_id": "CSAFPID-232899"
}
},
{
"category": "service_pack",
"name": "9.8.2.20",
"product": {
"name": "9.8.2.20",
"product_id": "CSAFPID-232902"
}
},
{
"category": "service_pack",
"name": "9.8.2.24",
"product": {
"name": "9.8.2.24",
"product_id": "CSAFPID-239005"
}
},
{
"category": "service_pack",
"name": "9.8.2.26",
"product": {
"name": "9.8.2.26",
"product_id": "CSAFPID-239006"
}
},
{
"category": "service_pack",
"name": "9.8.2.28",
"product": {
"name": "9.8.2.28",
"product_id": "CSAFPID-248821"
}
},
{
"category": "service_pack",
"name": "9.8.2.33",
"product": {
"name": "9.8.2.33",
"product_id": "CSAFPID-248822"
}
},
{
"category": "service_pack",
"name": "9.8.2.35",
"product": {
"name": "9.8.2.35",
"product_id": "CSAFPID-248823"
}
},
{
"category": "service_pack",
"name": "9.8.2.38",
"product": {
"name": "9.8.2.38",
"product_id": "CSAFPID-248824"
}
},
{
"category": "service_pack",
"name": "9.8.3.8",
"product": {
"name": "9.8.3.8",
"product_id": "CSAFPID-248825"
}
},
{
"category": "service_pack",
"name": "9.8.3.11",
"product": {
"name": "9.8.3.11",
"product_id": "CSAFPID-248826"
}
},
{
"category": "service_pack",
"name": "9.8.3.14",
"product": {
"name": "9.8.3.14",
"product_id": "CSAFPID-248827"
}
},
{
"category": "service_pack",
"name": "9.8.3.16",
"product": {
"name": "9.8.3.16",
"product_id": "CSAFPID-251745"
}
},
{
"category": "service_pack",
"name": "9.8.3.18",
"product": {
"name": "9.8.3.18",
"product_id": "CSAFPID-255556"
}
},
{
"category": "service_pack",
"name": "9.8.3.21",
"product": {
"name": "9.8.3.21",
"product_id": "CSAFPID-255557"
}
},
{
"category": "service_pack",
"name": "9.8.3",
"product": {
"name": "9.8.3",
"product_id": "CSAFPID-255929"
}
},
{
"category": "service_pack",
"name": "9.8.3.26",
"product": {
"name": "9.8.3.26",
"product_id": "CSAFPID-265020"
}
},
{
"category": "service_pack",
"name": "9.8.3.29",
"product": {
"name": "9.8.3.29",
"product_id": "CSAFPID-265021"
}
},
{
"category": "service_pack",
"name": "9.8.4",
"product": {
"name": "9.8.4",
"product_id": "CSAFPID-265022"
}
},
{
"category": "service_pack",
"name": "9.8.4.3",
"product": {
"name": "9.8.4.3",
"product_id": "CSAFPID-266069"
}
},
{
"category": "service_pack",
"name": "9.8.4.7",
"product": {
"name": "9.8.4.7",
"product_id": "CSAFPID-268477"
}
},
{
"category": "service_pack",
"name": "9.8.4.8",
"product": {
"name": "9.8.4.8",
"product_id": "CSAFPID-276357"
}
},
{
"category": "service_pack",
"name": "9.8.4.10",
"product": {
"name": "9.8.4.10",
"product_id": "CSAFPID-276358"
}
},
{
"category": "service_pack",
"name": "9.8.4.12",
"product": {
"name": "9.8.4.12",
"product_id": "CSAFPID-276359"
}
},
{
"category": "service_pack",
"name": "9.8.4.15",
"product": {
"name": "9.8.4.15",
"product_id": "CSAFPID-276930"
}
},
{
"category": "service_pack",
"name": "9.8.4.17",
"product": {
"name": "9.8.4.17",
"product_id": "CSAFPID-277312"
}
},
{
"category": "service_pack",
"name": "9.8.4.25",
"product": {
"name": "9.8.4.25",
"product_id": "CSAFPID-278502"
}
},
{
"category": "service_pack",
"name": "9.8.4.20",
"product": {
"name": "9.8.4.20",
"product_id": "CSAFPID-278713"
}
},
{
"category": "service_pack",
"name": "9.8.4.22",
"product": {
"name": "9.8.4.22",
"product_id": "CSAFPID-278714"
}
}
],
"category": "product_version",
"name": "9.8"
},
{
"branches": [
{
"category": "service_pack",
"name": "9.12.1",
"product": {
"name": "9.12.1",
"product_id": "CSAFPID-255564"
}
},
{
"category": "service_pack",
"name": "9.12.1.2",
"product": {
"name": "9.12.1.2",
"product_id": "CSAFPID-265028"
}
},
{
"category": "service_pack",
"name": "9.12.1.3",
"product": {
"name": "9.12.1.3",
"product_id": "CSAFPID-265029"
}
},
{
"category": "service_pack",
"name": "9.12.2",
"product": {
"name": "9.12.2",
"product_id": "CSAFPID-268481"
}
},
{
"category": "service_pack",
"name": "9.12.2.5",
"product": {
"name": "9.12.2.5",
"product_id": "CSAFPID-276367"
}
},
{
"category": "service_pack",
"name": "9.12.2.9",
"product": {
"name": "9.12.2.9",
"product_id": "CSAFPID-276368"
}
},
{
"category": "service_pack",
"name": "9.12.3",
"product": {
"name": "9.12.3",
"product_id": "CSAFPID-276369"
}
},
{
"category": "service_pack",
"name": "9.12.3.2",
"product": {
"name": "9.12.3.2",
"product_id": "CSAFPID-276931"
}
},
{
"category": "service_pack",
"name": "9.12.3.7",
"product": {
"name": "9.12.3.7",
"product_id": "CSAFPID-277325"
}
},
{
"category": "service_pack",
"name": "9.12.4",
"product": {
"name": "9.12.4",
"product_id": "CSAFPID-278378"
}
},
{
"category": "service_pack",
"name": "9.12.3.12",
"product": {
"name": "9.12.3.12",
"product_id": "CSAFPID-278716"
}
},
{
"category": "service_pack",
"name": "9.12.3.9",
"product": {
"name": "9.12.3.9",
"product_id": "CSAFPID-278718"
}
},
{
"category": "service_pack",
"name": "9.12.2.1",
"product": {
"name": "9.12.2.1",
"product_id": "CSAFPID-278719"
}
},
{
"category": "service_pack",
"name": "9.12.4.2",
"product": {
"name": "9.12.4.2",
"product_id": "CSAFPID-278752"
}
}
],
"category": "product_version",
"name": "9.12"
},
{
"branches": [
{
"category": "service_pack",
"name": "9.14.1",
"product": {
"name": "9.14.1",
"product_id": "CSAFPID-278380"
}
},
{
"category": "service_pack",
"name": "9.14.1.10",
"product": {
"name": "9.14.1.10",
"product_id": "CSAFPID-278725"
}
}
],
"category": "product_version",
"name": "9.14"
}
],
"category": "product_family",
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software"
},
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "6.2.3",
"product": {
"name": "6.2.3",
"product_id": "CSAFPID-233334"
}
},
{
"category": "service_pack",
"name": "6.2.3.1",
"product": {
"name": "6.2.3.1",
"product_id": "CSAFPID-245396"
}
},
{
"category": "service_pack",
"name": "6.2.3.2",
"product": {
"name": "6.2.3.2",
"product_id": "CSAFPID-245397"
}
},
{
"category": "service_pack",
"name": "6.2.3.3",
"product": {
"name": "6.2.3.3",
"product_id": "CSAFPID-245398"
}
},
{
"category": "service_pack",
"name": "6.2.3.4",
"product": {
"name": "6.2.3.4",
"product_id": "CSAFPID-247893"
}
},
{
"category": "service_pack",
"name": "6.2.3.5",
"product": {
"name": "6.2.3.5",
"product_id": "CSAFPID-247894"
}
},
{
"category": "service_pack",
"name": "6.2.3.6",
"product": {
"name": "6.2.3.6",
"product_id": "CSAFPID-248816"
}
},
{
"category": "service_pack",
"name": "6.2.3.7",
"product": {
"name": "6.2.3.7",
"product_id": "CSAFPID-251756"
}
},
{
"category": "service_pack",
"name": "6.2.3.8",
"product": {
"name": "6.2.3.8",
"product_id": "CSAFPID-251757"
}
},
{
"category": "service_pack",
"name": "6.2.3.10",
"product": {
"name": "6.2.3.10",
"product_id": "CSAFPID-258063"
}
},
{
"category": "service_pack",
"name": "6.2.3.11",
"product": {
"name": "6.2.3.11",
"product_id": "CSAFPID-258064"
}
},
{
"category": "service_pack",
"name": "6.2.3.9",
"product": {
"name": "6.2.3.9",
"product_id": "CSAFPID-258915"
}
},
{
"category": "service_pack",
"name": "6.2.3.12",
"product": {
"name": "6.2.3.12",
"product_id": "CSAFPID-265011"
}
},
{
"category": "service_pack",
"name": "6.2.3.13",
"product": {
"name": "6.2.3.13",
"product_id": "CSAFPID-267675"
}
},
{
"category": "service_pack",
"name": "6.2.3.14",
"product": {
"name": "6.2.3.14",
"product_id": "CSAFPID-267676"
}
},
{
"category": "service_pack",
"name": "6.2.3.15",
"product": {
"name": "6.2.3.15",
"product_id": "CSAFPID-275475"
}
},
{
"category": "service_pack",
"name": "6.2.3.16",
"product": {
"name": "6.2.3.16",
"product_id": "CSAFPID-278503"
}
}
],
"category": "product_version",
"name": "6.2"
},
{
"branches": [
{
"category": "service_pack",
"name": "6.6.0",
"product": {
"name": "6.6.0",
"product_id": "CSAFPID-225862"
}
},
{
"category": "service_pack",
"name": "6.6.0.1",
"product": {
"name": "6.6.0.1",
"product_id": "CSAFPID-278885"
}
}
],
"category": "product_version",
"name": "6.6"
},
{
"branches": [
{
"category": "service_pack",
"name": "6.4.0",
"product": {
"name": "6.4.0",
"product_id": "CSAFPID-265014"
}
},
{
"category": "service_pack",
"name": "6.4.0.1",
"product": {
"name": "6.4.0.1",
"product_id": "CSAFPID-265015"
}
},
{
"category": "service_pack",
"name": "6.4.0.3",
"product": {
"name": "6.4.0.3",
"product_id": "CSAFPID-265950"
}
},
{
"category": "service_pack",
"name": "6.4.0.2",
"product": {
"name": "6.4.0.2",
"product_id": "CSAFPID-268602"
}
},
{
"category": "service_pack",
"name": "6.4.0.4",
"product": {
"name": "6.4.0.4",
"product_id": "CSAFPID-276372"
}
},
{
"category": "service_pack",
"name": "6.4.0.5",
"product": {
"name": "6.4.0.5",
"product_id": "CSAFPID-276373"
}
},
{
"category": "service_pack",
"name": "6.4.0.6",
"product": {
"name": "6.4.0.6",
"product_id": "CSAFPID-276933"
}
},
{
"category": "service_pack",
"name": "6.4.0.7",
"product": {
"name": "6.4.0.7",
"product_id": "CSAFPID-276934"
}
},
{
"category": "service_pack",
"name": "6.4.0.8",
"product": {
"name": "6.4.0.8",
"product_id": "CSAFPID-276935"
}
},
{
"category": "service_pack",
"name": "6.4.0.9",
"product": {
"name": "6.4.0.9",
"product_id": "CSAFPID-278397"
}
}
],
"category": "product_version",
"name": "6.4"
}
],
"category": "product_family",
"name": "Cisco Secure Firewall Threat Defense (FTD) Software"
},
{
"category": "product_name",
"name": "Cisco Firepower 2100 Series",
"product": {
"name": "Cisco Firepower 2100 Series",
"product_id": "CSAFPID-277392"
}
},
{
"category": "product_name",
"name": "Cisco Firepower 1000 Series",
"product": {
"name": "Cisco Firepower 1000 Series",
"product_id": "CSAFPID-277393"
}
}
],
"category": "vendor",
"name": "Cisco"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232588:277392"
},
"product_reference": "CSAFPID-232588",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.8 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232589:277392"
},
"product_reference": "CSAFPID-232589",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.14 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232897:277392"
},
"product_reference": "CSAFPID-232897",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.15 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232898:277392"
},
"product_reference": "CSAFPID-232898",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.17 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232899:277392"
},
"product_reference": "CSAFPID-232899",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.20 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-232902:277392"
},
"product_reference": "CSAFPID-232902",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.24 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-239005:277392"
},
"product_reference": "CSAFPID-239005",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.26 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-239006:277392"
},
"product_reference": "CSAFPID-239006",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.28 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248821:277392"
},
"product_reference": "CSAFPID-248821",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.33 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248822:277392"
},
"product_reference": "CSAFPID-248822",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.35 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248823:277392"
},
"product_reference": "CSAFPID-248823",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.2.38 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248824:277392"
},
"product_reference": "CSAFPID-248824",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.8 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248825:277392"
},
"product_reference": "CSAFPID-248825",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.11 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248826:277392"
},
"product_reference": "CSAFPID-248826",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.14 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248827:277392"
},
"product_reference": "CSAFPID-248827",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.16 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-251745:277392"
},
"product_reference": "CSAFPID-251745",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.18 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-255556:277392"
},
"product_reference": "CSAFPID-255556",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.21 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-255557:277392"
},
"product_reference": "CSAFPID-255557",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-255929:277392"
},
"product_reference": "CSAFPID-255929",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.26 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265020:277392"
},
"product_reference": "CSAFPID-265020",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.3.29 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265021:277392"
},
"product_reference": "CSAFPID-265021",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265022:277392"
},
"product_reference": "CSAFPID-265022",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-266069:277392"
},
"product_reference": "CSAFPID-266069",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.7 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-268477:277392"
},
"product_reference": "CSAFPID-268477",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.8 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276357:277392"
},
"product_reference": "CSAFPID-276357",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.10 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276358:277392"
},
"product_reference": "CSAFPID-276358",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.12 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276359:277392"
},
"product_reference": "CSAFPID-276359",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.15 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276930:277392"
},
"product_reference": "CSAFPID-276930",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.17 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-277312:277392"
},
"product_reference": "CSAFPID-277312",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.25 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278502:277392"
},
"product_reference": "CSAFPID-278502",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.20 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278713:277392"
},
"product_reference": "CSAFPID-278713",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.8.4.22 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278714:277392"
},
"product_reference": "CSAFPID-278714",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-255564:277392"
},
"product_reference": "CSAFPID-255564",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265028:277392"
},
"product_reference": "CSAFPID-265028",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265029:277392"
},
"product_reference": "CSAFPID-265029",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-268481:277392"
},
"product_reference": "CSAFPID-268481",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.2.5 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276367:277392"
},
"product_reference": "CSAFPID-276367",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.2.9 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276368:277392"
},
"product_reference": "CSAFPID-276368",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276369:277392"
},
"product_reference": "CSAFPID-276369",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.3.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276931:277392"
},
"product_reference": "CSAFPID-276931",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.3.7 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-277325:277392"
},
"product_reference": "CSAFPID-277325",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.4 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278378:277392"
},
"product_reference": "CSAFPID-278378",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.3.12 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278716:277392"
},
"product_reference": "CSAFPID-278716",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.3.9 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278718:277392"
},
"product_reference": "CSAFPID-278718",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.2.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278719:277392"
},
"product_reference": "CSAFPID-278719",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.4.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278752:277392"
},
"product_reference": "CSAFPID-278752",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278380:277392"
},
"product_reference": "CSAFPID-278380",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-278380:277393"
},
"product_reference": "CSAFPID-278380",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278725:277392"
},
"product_reference": "CSAFPID-278725",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-278725:277393"
},
"product_reference": "CSAFPID-278725",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-233334:277392"
},
"product_reference": "CSAFPID-233334",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-245396:277392"
},
"product_reference": "CSAFPID-245396",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-245397:277392"
},
"product_reference": "CSAFPID-245397",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-245398:277392"
},
"product_reference": "CSAFPID-245398",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.4 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-247893:277392"
},
"product_reference": "CSAFPID-247893",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.5 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-247894:277392"
},
"product_reference": "CSAFPID-247894",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.6 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-248816:277392"
},
"product_reference": "CSAFPID-248816",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.7 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-251756:277392"
},
"product_reference": "CSAFPID-251756",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.8 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-251757:277392"
},
"product_reference": "CSAFPID-251757",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.10 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-258063:277392"
},
"product_reference": "CSAFPID-258063",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.11 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-258064:277392"
},
"product_reference": "CSAFPID-258064",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.9 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-258915:277392"
},
"product_reference": "CSAFPID-258915",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.12 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265011:277392"
},
"product_reference": "CSAFPID-265011",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.13 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-267675:277392"
},
"product_reference": "CSAFPID-267675",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.14 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-267676:277392"
},
"product_reference": "CSAFPID-267676",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.15 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-275475:277392"
},
"product_reference": "CSAFPID-275475",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.2.3.16 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278503:277392"
},
"product_reference": "CSAFPID-278503",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.6.0 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-225862:277392"
},
"product_reference": "CSAFPID-225862",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.6.0 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-225862:277393"
},
"product_reference": "CSAFPID-225862",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.6.0.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278885:277392"
},
"product_reference": "CSAFPID-278885",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.6.0.1 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-278885:277393"
},
"product_reference": "CSAFPID-278885",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265014:277392"
},
"product_reference": "CSAFPID-265014",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-265014:277393"
},
"product_reference": "CSAFPID-265014",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.1 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265015:277392"
},
"product_reference": "CSAFPID-265015",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.3 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-265950:277392"
},
"product_reference": "CSAFPID-265950",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.3 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-265950:277393"
},
"product_reference": "CSAFPID-265950",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.2 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-268602:277392"
},
"product_reference": "CSAFPID-268602",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.2 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-268602:277393"
},
"product_reference": "CSAFPID-268602",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.4 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276372:277392"
},
"product_reference": "CSAFPID-276372",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.4 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-276372:277393"
},
"product_reference": "CSAFPID-276372",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.5 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276373:277392"
},
"product_reference": "CSAFPID-276373",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.5 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-276373:277393"
},
"product_reference": "CSAFPID-276373",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.6 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276933:277392"
},
"product_reference": "CSAFPID-276933",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.6 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-276933:277393"
},
"product_reference": "CSAFPID-276933",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.7 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276934:277392"
},
"product_reference": "CSAFPID-276934",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.7 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-276934:277393"
},
"product_reference": "CSAFPID-276934",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.8 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-276935:277392"
},
"product_reference": "CSAFPID-276935",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.8 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-276935:277393"
},
"product_reference": "CSAFPID-276935",
"relates_to_product_reference": "CSAFPID-277393"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.9 when installed on Cisco Firepower 2100 Series",
"product_id": "CSAFPID-278397:277392"
},
"product_reference": "CSAFPID-278397",
"relates_to_product_reference": "CSAFPID-277392"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Secure Firewall Threat Defense (FTD) Software 6.4.0.9 when installed on Cisco Firepower 1000 Series",
"product_id": "CSAFPID-278397:277393"
},
"product_reference": "CSAFPID-278397",
"relates_to_product_reference": "CSAFPID-277393"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-3458",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvt31178"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvt31177"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-232588:277392",
"CSAFPID-232589:277392",
"CSAFPID-232897:277392",
"CSAFPID-232898:277392",
"CSAFPID-232899:277392",
"CSAFPID-232902:277392",
"CSAFPID-239005:277392",
"CSAFPID-239006:277392",
"CSAFPID-248821:277392",
"CSAFPID-248822:277392",
"CSAFPID-248823:277392",
"CSAFPID-248824:277392",
"CSAFPID-248825:277392",
"CSAFPID-248826:277392",
"CSAFPID-248827:277392",
"CSAFPID-251745:277392",
"CSAFPID-255556:277392",
"CSAFPID-255557:277392",
"CSAFPID-255564:277392",
"CSAFPID-255929:277392",
"CSAFPID-265020:277392",
"CSAFPID-265021:277392",
"CSAFPID-265022:277392",
"CSAFPID-265028:277392",
"CSAFPID-265029:277392",
"CSAFPID-266069:277392",
"CSAFPID-268477:277392",
"CSAFPID-268481:277392",
"CSAFPID-276357:277392",
"CSAFPID-276358:277392",
"CSAFPID-276359:277392",
"CSAFPID-276367:277392",
"CSAFPID-276368:277392",
"CSAFPID-276369:277392",
"CSAFPID-276930:277392",
"CSAFPID-276931:277392",
"CSAFPID-277312:277392",
"CSAFPID-277325:277392",
"CSAFPID-278378:277392",
"CSAFPID-278380:277392",
"CSAFPID-278380:277393",
"CSAFPID-278502:277392",
"CSAFPID-278713:277392",
"CSAFPID-278714:277392",
"CSAFPID-278716:277392",
"CSAFPID-278718:277392",
"CSAFPID-278719:277392",
"CSAFPID-278725:277392",
"CSAFPID-278725:277393",
"CSAFPID-278752:277392",
"CSAFPID-225862:277392",
"CSAFPID-225862:277393",
"CSAFPID-233334:277392",
"CSAFPID-245396:277392",
"CSAFPID-245397:277392",
"CSAFPID-245398:277392",
"CSAFPID-247893:277392",
"CSAFPID-247894:277392",
"CSAFPID-248816:277392",
"CSAFPID-251756:277392",
"CSAFPID-251757:277392",
"CSAFPID-258063:277392",
"CSAFPID-258064:277392",
"CSAFPID-258915:277392",
"CSAFPID-265011:277392",
"CSAFPID-265014:277392",
"CSAFPID-265014:277393",
"CSAFPID-265015:277392",
"CSAFPID-265950:277392",
"CSAFPID-265950:277393",
"CSAFPID-267675:277392",
"CSAFPID-267676:277392",
"CSAFPID-268602:277392",
"CSAFPID-268602:277393",
"CSAFPID-275475:277392",
"CSAFPID-276372:277392",
"CSAFPID-276372:277393",
"CSAFPID-276373:277392",
"CSAFPID-276373:277393",
"CSAFPID-276933:277392",
"CSAFPID-276933:277393",
"CSAFPID-276934:277392",
"CSAFPID-276934:277393",
"CSAFPID-276935:277392",
"CSAFPID-276935:277393",
"CSAFPID-278397:277392",
"CSAFPID-278397:277393",
"CSAFPID-278503:277392",
"CSAFPID-278885:277392",
"CSAFPID-278885:277393"
]
},
"release_date": "2020-10-21T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-225862:277392",
"CSAFPID-225862:277393",
"CSAFPID-233334:277392",
"CSAFPID-245396:277392",
"CSAFPID-245397:277392",
"CSAFPID-245398:277392",
"CSAFPID-247893:277392",
"CSAFPID-247894:277392",
"CSAFPID-248816:277392",
"CSAFPID-251756:277392",
"CSAFPID-251757:277392",
"CSAFPID-258063:277392",
"CSAFPID-258064:277392",
"CSAFPID-258915:277392",
"CSAFPID-265011:277392",
"CSAFPID-265014:277392",
"CSAFPID-265014:277393",
"CSAFPID-265015:277392",
"CSAFPID-265950:277392",
"CSAFPID-265950:277393",
"CSAFPID-267675:277392",
"CSAFPID-267676:277392",
"CSAFPID-268602:277392",
"CSAFPID-268602:277393",
"CSAFPID-275475:277392",
"CSAFPID-276372:277392",
"CSAFPID-276372:277393",
"CSAFPID-276373:277392",
"CSAFPID-276373:277393",
"CSAFPID-276933:277392",
"CSAFPID-276933:277393",
"CSAFPID-276934:277392",
"CSAFPID-276934:277393",
"CSAFPID-276935:277392",
"CSAFPID-276935:277393",
"CSAFPID-278397:277392",
"CSAFPID-278397:277393",
"CSAFPID-278503:277392",
"CSAFPID-278885:277392",
"CSAFPID-278885:277393",
"CSAFPID-232588:277392",
"CSAFPID-232589:277392",
"CSAFPID-232897:277392",
"CSAFPID-232898:277392",
"CSAFPID-232899:277392",
"CSAFPID-232902:277392",
"CSAFPID-239005:277392",
"CSAFPID-239006:277392",
"CSAFPID-248821:277392",
"CSAFPID-248822:277392",
"CSAFPID-248823:277392",
"CSAFPID-248824:277392",
"CSAFPID-248825:277392",
"CSAFPID-248826:277392",
"CSAFPID-248827:277392",
"CSAFPID-251745:277392",
"CSAFPID-255556:277392",
"CSAFPID-255557:277392",
"CSAFPID-255564:277392",
"CSAFPID-255929:277392",
"CSAFPID-265020:277392",
"CSAFPID-265021:277392",
"CSAFPID-265022:277392",
"CSAFPID-265028:277392",
"CSAFPID-265029:277392",
"CSAFPID-266069:277392",
"CSAFPID-268477:277392",
"CSAFPID-268481:277392",
"CSAFPID-276357:277392",
"CSAFPID-276358:277392",
"CSAFPID-276359:277392",
"CSAFPID-276367:277392",
"CSAFPID-276368:277392",
"CSAFPID-276369:277392",
"CSAFPID-276930:277392",
"CSAFPID-276931:277392",
"CSAFPID-277312:277392",
"CSAFPID-277325:277392",
"CSAFPID-278378:277392",
"CSAFPID-278380:277392",
"CSAFPID-278380:277393",
"CSAFPID-278502:277392",
"CSAFPID-278713:277392",
"CSAFPID-278714:277392",
"CSAFPID-278716:277392",
"CSAFPID-278718:277392",
"CSAFPID-278719:277392",
"CSAFPID-278725:277392",
"CSAFPID-278725:277393",
"CSAFPID-278752:277392"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-232588:277392",
"CSAFPID-232589:277392",
"CSAFPID-232897:277392",
"CSAFPID-232898:277392",
"CSAFPID-232899:277392",
"CSAFPID-232902:277392",
"CSAFPID-239005:277392",
"CSAFPID-239006:277392",
"CSAFPID-248821:277392",
"CSAFPID-248822:277392",
"CSAFPID-248823:277392",
"CSAFPID-248824:277392",
"CSAFPID-248825:277392",
"CSAFPID-248826:277392",
"CSAFPID-248827:277392",
"CSAFPID-251745:277392",
"CSAFPID-255556:277392",
"CSAFPID-255557:277392",
"CSAFPID-255564:277392",
"CSAFPID-255929:277392",
"CSAFPID-265020:277392",
"CSAFPID-265021:277392",
"CSAFPID-265022:277392",
"CSAFPID-265028:277392",
"CSAFPID-265029:277392",
"CSAFPID-266069:277392",
"CSAFPID-268477:277392",
"CSAFPID-268481:277392",
"CSAFPID-276357:277392",
"CSAFPID-276358:277392",
"CSAFPID-276359:277392",
"CSAFPID-276367:277392",
"CSAFPID-276368:277392",
"CSAFPID-276369:277392",
"CSAFPID-276930:277392",
"CSAFPID-276931:277392",
"CSAFPID-277312:277392",
"CSAFPID-277325:277392",
"CSAFPID-278378:277392",
"CSAFPID-278380:277392",
"CSAFPID-278380:277393",
"CSAFPID-278502:277392",
"CSAFPID-278713:277392",
"CSAFPID-278714:277392",
"CSAFPID-278716:277392",
"CSAFPID-278718:277392",
"CSAFPID-278719:277392",
"CSAFPID-278725:277392",
"CSAFPID-278725:277393",
"CSAFPID-278752:277392",
"CSAFPID-225862:277392",
"CSAFPID-225862:277393",
"CSAFPID-233334:277392",
"CSAFPID-245396:277392",
"CSAFPID-245397:277392",
"CSAFPID-245398:277392",
"CSAFPID-247893:277392",
"CSAFPID-247894:277392",
"CSAFPID-248816:277392",
"CSAFPID-251756:277392",
"CSAFPID-251757:277392",
"CSAFPID-258063:277392",
"CSAFPID-258064:277392",
"CSAFPID-258915:277392",
"CSAFPID-265011:277392",
"CSAFPID-265014:277392",
"CSAFPID-265014:277393",
"CSAFPID-265015:277392",
"CSAFPID-265950:277392",
"CSAFPID-265950:277393",
"CSAFPID-267675:277392",
"CSAFPID-267676:277392",
"CSAFPID-268602:277392",
"CSAFPID-268602:277393",
"CSAFPID-275475:277392",
"CSAFPID-276372:277392",
"CSAFPID-276372:277393",
"CSAFPID-276373:277392",
"CSAFPID-276373:277393",
"CSAFPID-276933:277392",
"CSAFPID-276933:277393",
"CSAFPID-276934:277392",
"CSAFPID-276934:277393",
"CSAFPID-276935:277392",
"CSAFPID-276935:277393",
"CSAFPID-278397:277392",
"CSAFPID-278397:277393",
"CSAFPID-278503:277392",
"CSAFPID-278885:277392",
"CSAFPID-278885:277393"
]
}
],
"title": "Cisco FXOS Software for Firepower 1000/2100 Series Appliance Secure Boot Bypass Vulnerability"
}
]
}
gsd-2020-3458
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2020-3458",
"description": "Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots.",
"id": "GSD-2020-3458"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-3458"
],
"details": "Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots.",
"id": "GSD-2020-3458",
"modified": "2023-12-13T01:22:09.442570Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-10-21T16:00:00",
"ID": "CVE-2020-3458",
"STATE": "PUBLIC",
"TITLE": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Adaptive Security Appliance (ASA) Software ",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "6.7",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-693"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20201021 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
}
]
},
"source": {
"advisory": "cisco-sa-fxos-sbbyp-KqP6NgrE",
"defect": [
[
"CSCvt31177",
"CSCvt31178"
]
],
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.8.4.26",
"versionStartIncluding": "9.8.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.9.2.80",
"versionStartIncluding": "9.9.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.10.1.43",
"versionStartIncluding": "9.10.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.12.4.3",
"versionStartIncluding": "9.12.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.13.1.13",
"versionStartIncluding": "9.13.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.14.1.15",
"versionStartIncluding": "9.14.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_1010:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.2.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.3.0.6",
"versionStartIncluding": "6.3.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.4.0.10",
"versionStartIncluding": "6.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.5.0.5",
"versionStartIncluding": "6.5.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2020-3458"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20201021 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities",
"refsource": "CISCO",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-08-16T16:17Z",
"publishedDate": "2020-10-21T19:15Z"
}
}
}
CERTFR-2020-AVI-671
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Cisco ASA versions 9.14.x antérieures à 9.14.1.30 | ||
| Cisco | N/A | Cisco ASA versions antérieures à 9.6.4.45 | ||
| Cisco | N/A | Cisco ASA versions 9.13.x antérieures à 9.13.1.13 | ||
| Cisco | N/A | Cisco FMC versions antérieures à 6.6.1 | ||
| Cisco | N/A | Cisco ASA versions 9.12.x antérieures à 9.12.4.4 | ||
| Cisco | N/A | Cisco FTD versions antérieures à 6.6.1 | ||
| Cisco | N/A | Cisco ASA versions 9.9.x antérieures à 9.9.2.80 | ||
| Cisco | N/A | Cisco FXOS versions 2.6.x antérieures à 2.6.1.214 | ||
| Cisco | N/A | Cisco FXOS versions 2.7.x antérieures à 2.7.1.131 | ||
| Cisco | N/A | Cisco FXOS versions antérieures à 2.4.1.268 | ||
| Cisco | N/A | Cisco ASA versions 9.10.x antérieures à 9.10.1.44 | ||
| Cisco | N/A | Cisco ASA versions 9.7.x et 9.8.x antérieures à 9.8.4.29 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco ASA versions 9.14.x ant\u00e9rieures \u00e0 9.14.1.30",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions ant\u00e9rieures \u00e0 9.6.4.45",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions 9.13.x ant\u00e9rieures \u00e0 9.13.1.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco FMC versions ant\u00e9rieures \u00e0 6.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions 9.12.x ant\u00e9rieures \u00e0 9.12.4.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco FTD versions ant\u00e9rieures \u00e0 6.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions 9.9.x ant\u00e9rieures \u00e0 9.9.2.80",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco FXOS versions 2.6.x ant\u00e9rieures \u00e0 2.6.1.214",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco FXOS versions 2.7.x ant\u00e9rieures \u00e0 2.7.1.131",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco FXOS versions ant\u00e9rieures \u00e0 2.4.1.268",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions 9.10.x ant\u00e9rieures \u00e0 9.10.1.44",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions 9.7.x et 9.8.x ant\u00e9rieures \u00e0 9.8.4.29",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-3514",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3514"
},
{
"name": "CVE-2020-3562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3562"
},
{
"name": "CVE-2020-3456",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3456"
},
{
"name": "CVE-2020-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3499"
},
{
"name": "CVE-2020-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3550"
},
{
"name": "CVE-2020-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3549"
},
{
"name": "CVE-2020-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3577"
},
{
"name": "CVE-2020-3373",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3373"
},
{
"name": "CVE-2020-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3572"
},
{
"name": "CVE-2020-3458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3458"
},
{
"name": "CVE-2020-3304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3304"
},
{
"name": "CVE-2020-3533",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3533"
},
{
"name": "CVE-2020-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3554"
},
{
"name": "CVE-2020-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3529"
},
{
"name": "CVE-2020-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3436"
},
{
"name": "CVE-2020-3455",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3455"
},
{
"name": "CVE-2020-3528",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3528"
},
{
"name": "CVE-2020-3571",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3571"
},
{
"name": "CVE-2020-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3563"
},
{
"name": "CVE-2020-3410",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3410"
}
],
"initial_release_date": "2020-10-22T00:00:00",
"last_revision_date": "2020-10-22T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-671",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-10-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-sslvpndma-dos-HRrqB9Yx du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-sslvpndma-dos-HRrqB9Yx"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fxos-sbbyp-KqP6NgrE du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-inline-dos-nXqUyEqM du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-inline-dos-nXqUyEqM"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-icmp-dos-hxxcycM du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-icmp-dos-hxxcycM"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-dos-QFcNEPfx du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dos-QFcNEPfx"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-frag-memleak-mCtqdP9n du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-frag-memleak-mCtqdP9n"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftdfmc-sft-mitm-tc8AzFs2 du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-ssl-dcrpt-dos-RYEkX4yy du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ssl-dcrpt-dos-RYEkX4yy"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-fileup-dos-zvC7wtys du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-fileup-dos-zvC7wtys"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-ftd-tcp-dos-N3DMnU4T du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-tcp-dos-N3DMnU4T"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-cacauthbyp-NCLGZm3Q du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cacauthbyp-NCLGZm3Q"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-snmp-dos-R8ENPbOs du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snmp-dos-R8ENPbOs"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftdfmc-dirtrav-NW8XcuSB du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dirtrav-NW8XcuSB"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-container-esc-FmYqFBQV du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-container-esc-FmYqFBQV"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-tcp-dos-GDcZDqAf du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tcp-dos-GDcZDqAf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fxos-sbbp-XTuPkYTn du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fxosfcm-csrf-uhO4e5BZ du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxosfcm-csrf-uhO4e5BZ"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-ospflls-37Xy2q6r du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ospflls-37Xy2q6r"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-webdos-fBzM5Ynw du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webdos-fBzM5Ynw"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftdfmc-dos-NjYvDcLA du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dos-NjYvDcLA"
}
]
}
fkie_cve-2020-3458
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | adaptive_security_appliance_software | * | |
| cisco | adaptive_security_appliance_software | * | |
| cisco | adaptive_security_appliance_software | * | |
| cisco | adaptive_security_appliance_software | * | |
| cisco | adaptive_security_appliance_software | * | |
| cisco | adaptive_security_appliance_software | * | |
| cisco | firepower_1010 | * | |
| cisco | firepower_1010 | - | |
| cisco | firepower_1120 | - | |
| cisco | firepower_1140 | - | |
| cisco | firepower_1150 | - | |
| cisco | firepower_2110 | - | |
| cisco | firepower_2120 | - | |
| cisco | firepower_2130 | - | |
| cisco | firepower_2140 | - | |
| cisco | firepower_threat_defense | * | |
| cisco | firepower_threat_defense | * | |
| cisco | firepower_threat_defense | * | |
| cisco | firepower_threat_defense | * | |
| cisco | firepower_threat_defense | 6.6.0 | |
| cisco | firepower_1010 | - | |
| cisco | firepower_1120 | - | |
| cisco | firepower_1140 | - | |
| cisco | firepower_1150 | - | |
| cisco | firepower_2110 | - | |
| cisco | firepower_2120 | - | |
| cisco | firepower_2130 | - | |
| cisco | firepower_2140 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E38D6F74-E407-4232-86C9-178AC3D00F1C",
"versionEndExcluding": "9.8.4.26",
"versionStartIncluding": "9.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E16D2CA3-B494-4348-BF0C-03969D1423D0",
"versionEndExcluding": "9.9.2.80",
"versionStartIncluding": "9.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036D010-F764-4899-A7B3-456084FC1392",
"versionEndExcluding": "9.10.1.43",
"versionStartIncluding": "9.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88977C36-3EF9-44FD-8406-2A223A8FDF4A",
"versionEndExcluding": "9.12.4.3",
"versionStartIncluding": "9.12.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4148D30-F285-4045-A017-82F5BF074233",
"versionEndExcluding": "9.13.1.13",
"versionStartIncluding": "9.13.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8353B0CD-5C3F-4F18-966B-DB43DA92838E",
"versionEndExcluding": "9.14.1.15",
"versionStartIncluding": "9.14.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:firepower_1010:*:*:*:*:*:*:*:*",
"matchCriteriaId": "018CB46C-D151-4D5C-9ED8-D5F57E2723CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFE3880-4B85-4E23-9836-70875D5109F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "727A02E8-40A1-4DFE-A3A2-91D628D3044F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F6546E-28F4-40DC-97D6-E0E023FE939B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB3B0EC3-4654-4D90-9D41-7EC2AD1DDF99",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52D96810-5F79-4A83-B8CA-D015790FCF72",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16FE2945-4975-4003-AE48-7E134E167A7F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCE7122A-5AA7-4ECD-B024-E27C9D0CFB7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "976901BF-C52C-4F81-956A-711AF8A60140",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2330600D-6AB1-4912-A595-2AE167853B93",
"versionEndIncluding": "6.2.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D27DE97-510A-4761-8184-6940745B54E2",
"versionEndExcluding": "6.3.0.6",
"versionStartIncluding": "6.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53C69C8B-5A19-4613-8861-683CF21806B7",
"versionEndExcluding": "6.4.0.10",
"versionStartIncluding": "6.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3ED0E59C-146C-494F-AD46-F6FB43F9C575",
"versionEndExcluding": "6.5.0.5",
"versionStartIncluding": "6.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD69468-8067-4A5D-B2B0-EC510D889AA0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFE3880-4B85-4E23-9836-70875D5109F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "727A02E8-40A1-4DFE-A3A2-91D628D3044F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F6546E-28F4-40DC-97D6-E0E023FE939B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB3B0EC3-4654-4D90-9D41-7EC2AD1DDF99",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52D96810-5F79-4A83-B8CA-D015790FCF72",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16FE2945-4975-4003-AE48-7E134E167A7F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCE7122A-5AA7-4ECD-B024-E27C9D0CFB7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "976901BF-C52C-4F81-956A-711AF8A60140",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades en el proceso de inicio seguro de Cisco Adaptive Security Appliance (ASA) Software y Firepower Threat Defense (FTD) Software para Dispositivos Firepower 1000 Series y Firepower 2100 Series podr\u00edan permitir a un atacante local autenticado omitir el mecanismo de inicio seguro.\u0026#xa0;Las vulnerabilidades son debido a protecciones insuficientes del proceso de arranque seguro.\u0026#xa0;Un atacante podr\u00eda explotar estas vulnerabilidades inyectando c\u00f3digo en archivos espec\u00edficos a los que luego se hace referencia durante el proceso de inicio del dispositivo.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante romper la cadena de confianza e inyectar c\u00f3digo en el proceso de arranque del dispositivo, que se ejecutar\u00eda en cada arranque y mantendr\u00eda la persistencia entre los reinicios"
}
],
"id": "CVE-2020-3458",
"lastModified": "2024-11-21T05:31:06.670",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-21T19:15:16.450",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-693"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ghsa-xj5h-8prx-gpx7
Vulnerability from github
Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots.
{
"affected": [],
"aliases": [
"CVE-2020-3458"
],
"database_specific": {
"cwe_ids": [
"CWE-693"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-10-21T19:15:00Z",
"severity": "MODERATE"
},
"details": "Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots.",
"id": "GHSA-xj5h-8prx-gpx7",
"modified": "2023-08-16T18:30:19Z",
"published": "2022-05-24T17:31:46Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3458"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.