Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-3455 (GCVE-0-2020-3455)
Vulnerability from cvelistv5
| URL | Tags | ||
|---|---|---|---|
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Firepower Extensible Operating System (FXOS) |
Version: n/a |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:37:54.973Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20201021 Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3455",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-13T17:17:19.550987Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-13T17:48:47.807Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Firepower Extensible Operating System (FXOS)",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-10-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-693",
"description": "CWE-693",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-21T18:36:19",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20201021 Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
}
],
"source": {
"advisory": "cisco-sa-fxos-sbbp-XTuPkYTn",
"defect": [
[
"CSCvt31171"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-10-21T16:00:00",
"ID": "CVE-2020-3455",
"STATE": "PUBLIC",
"TITLE": "Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Firepower Extensible Operating System (FXOS)",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "6.7",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-693"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20201021 Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
}
]
},
"source": {
"advisory": "cisco-sa-fxos-sbbp-XTuPkYTn",
"defect": [
[
"CSCvt31171"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3455",
"datePublished": "2020-10-21T18:36:19.422407Z",
"dateReserved": "2019-12-12T00:00:00",
"dateUpdated": "2024-11-13T17:48:47.807Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-3455\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2020-10-21T19:15:16.170\",\"lastModified\":\"2024-11-21T05:31:06.197\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el proceso de arranque seguro de Cisco FXOS Software, podr\u00eda permitir a un atacante local autenticado omitir los mecanismos de arranque seguro.\u0026#xa0;La vulnerabilidad es debido a unas protecciones insuficientes del proceso de arranque seguro.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al inyectar c\u00f3digo en un archivo espec\u00edfico al que luego se hace referencia durante el proceso de arranque del dispositivo.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante romper la cadena de confianza e inyectar c\u00f3digo en el proceso de arranque del dispositivo que podr\u00eda ser ejecutado en cada arranque y mantendr\u00eda la persistencia entre los reinicios\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-693\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.4.1.268\",\"matchCriteriaId\":\"5E2D2653-311F-4D73-8331-2F7FC8462F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6\",\"versionEndExcluding\":\"2.6.1.214\",\"matchCriteriaId\":\"22DB1993-7E30-4E53-9572-38D226656C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7\",\"versionEndExcluding\":\"2.7.1.131\",\"matchCriteriaId\":\"C2E8A64D-C8E2-4030-8616-D47741E43E3A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0CBC7F5-7767-43B6-9384-BE143FCDBD7F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957D64EB-D60E-4775-B9A8-B21CA48ED3B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A694AD51-9008-4AE6-8240-98B17AB527EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38AE6DC0-2B03-4D36-9856-42530312CC46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71DCEF22-ED20-4330-8502-EC2DD4C9838F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB2822B-B752-4CD9-A178-934957E306B4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F4868A-6D62-479C-9C19-F9AABDBB6B24\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65378F3A-777C-4AE2-87FB-1E7402F9EA1B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_9300_sm-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18048A84-BA0F-48EF-AFFB-635FF7F70C66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_9300_sm-36:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"317DF3DD-C7CD-4CA2-804F-A738E048BEB4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_9300_sm-40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C13CF29B-9308-452B-B7E0-9E818B5A6C1E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_9300_sm-44:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DB527C2-855E-4BB9-BCA7-94BE86100D44\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_9300_sm-44_x_3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E82C1B05-990D-49D2-B80A-C3EDD4082840\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_9300_sm-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421D91C3-8AB3-45E1-9E55-13ED1A4A623E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_9300_sm-56:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D741945-8B0A-408D-A5FE-D5B38DC6D46A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_9300_sm-56_x_3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9308CA67-E949-4338-A890-22B3C4428D70\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn\", \"name\": \"20201021 Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T07:37:54.973Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-3455\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-13T17:17:19.550987Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-13T17:19:39.438Z\"}}], \"cna\": {\"title\": \"Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability\", \"source\": {\"defect\": [[\"CSCvt31171\"]], \"advisory\": \"cisco-sa-fxos-sbbp-XTuPkYTn\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 6.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Firepower Extensible Operating System (FXOS)\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"datePublic\": \"2020-10-21T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn\", \"name\": \"20201021 Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-693\", \"description\": \"CWE-693\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2020-10-21T18:36:19\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"6.7\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\"}}, \"source\": {\"defect\": [[\"CSCvt31171\"]], \"advisory\": \"cisco-sa-fxos-sbbp-XTuPkYTn\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"Cisco Firepower Extensible Operating System (FXOS)\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn\", \"name\": \"20201021 Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability\", \"refsource\": \"CISCO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-693\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-3455\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2020-10-21T16:00:00\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2020-3455\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-13T17:48:47.807Z\", \"dateReserved\": \"2019-12-12T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2020-10-21T18:36:19.422407Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
fkie_cve-2020-3455
Vulnerability from fkie_nvd
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E2D2653-311F-4D73-8331-2F7FC8462F30",
"versionEndExcluding": "2.4.1.268",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22DB1993-7E30-4E53-9572-38D226656C8F",
"versionEndExcluding": "2.6.1.214",
"versionStartIncluding": "2.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E8A64D-C8E2-4030-8616-D47741E43E3A",
"versionEndExcluding": "2.7.1.131",
"versionStartIncluding": "2.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CBC7F5-7767-43B6-9384-BE143FCDBD7F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*",
"matchCriteriaId": "957D64EB-D60E-4775-B9A8-B21CA48ED3B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A694AD51-9008-4AE6-8240-98B17AB527EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38AE6DC0-2B03-4D36-9856-42530312CC46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71DCEF22-ED20-4330-8502-EC2DD4C9838F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB2822B-B752-4CD9-A178-934957E306B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81F4868A-6D62-479C-9C19-F9AABDBB6B24",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65378F3A-777C-4AE2-87FB-1E7402F9EA1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18048A84-BA0F-48EF-AFFB-635FF7F70C66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-36:-:*:*:*:*:*:*:*",
"matchCriteriaId": "317DF3DD-C7CD-4CA2-804F-A738E048BEB4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C13CF29B-9308-452B-B7E0-9E818B5A6C1E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-44:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB527C2-855E-4BB9-BCA7-94BE86100D44",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-44_x_3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E82C1B05-990D-49D2-B80A-C3EDD4082840",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "421D91C3-8AB3-45E1-9E55-13ED1A4A623E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D741945-8B0A-408D-A5FE-D5B38DC6D46A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-56_x_3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9308CA67-E949-4338-A890-22B3C4428D70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el proceso de arranque seguro de Cisco FXOS Software, podr\u00eda permitir a un atacante local autenticado omitir los mecanismos de arranque seguro.\u0026#xa0;La vulnerabilidad es debido a unas protecciones insuficientes del proceso de arranque seguro.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al inyectar c\u00f3digo en un archivo espec\u00edfico al que luego se hace referencia durante el proceso de arranque del dispositivo.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante romper la cadena de confianza e inyectar c\u00f3digo en el proceso de arranque del dispositivo que podr\u00eda ser ejecutado en cada arranque y mantendr\u00eda la persistencia entre los reinicios"
}
],
"id": "CVE-2020-3455",
"lastModified": "2024-11-21T05:31:06.197",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-21T19:15:16.170",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-693"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
cisco-sa-fxos-sbbp-xtupkytn
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was found during internal security testing."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms.\r\n\r\nThe vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\n",
"title": "Summary"
},
{
"category": "general",
"text": "This vulnerability affects Cisco FXOS Software releases when running on the following platforms:\r\n\r\nFirepower 4100 Series Appliances\r\nFirepower 9300 Series Appliances\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n\r\nFor the Firepower 1000 Series Appliances and Firepower 2100 Series Appliances, see the following advisory:\r\n\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE\"]",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "There are no workarounds that address this vulnerability.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Fixed Releases Cisco FXOS Software Cisco FXOS Software Release First Fixed Release for This Vulnerability Earlier than 2.2 Migrate to a fixed release. 2.2 Migrate to a fixed release. 2.3 Migrate to a fixed release. 2.4 2.4.1.268 2.6 2.6.1.214 2.7 2.7.1.131 2.8 Not vulnerable.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was found during internal security testing.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
}
],
"title": "Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability",
"tracking": {
"current_release_date": "2020-10-21T16:00:00+00:00",
"generator": {
"date": "2024-05-10T22:55:06+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-fxos-sbbp-XTuPkYTn",
"initial_release_date": "2020-10-21T16:00:00+00:00",
"revision_history": [
{
"date": "2020-10-21T15:57:14+00:00",
"number": "1.0.0",
"summary": "Initial public release."
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "2.2.1.63",
"product": {
"name": "2.2.1.63",
"product_id": "CSAFPID-253492"
}
},
{
"category": "service_pack",
"name": "2.2.1.70",
"product": {
"name": "2.2.1.70",
"product_id": "CSAFPID-253494"
}
},
{
"category": "service_pack",
"name": "2.2.2.17",
"product": {
"name": "2.2.2.17",
"product_id": "CSAFPID-253495"
}
},
{
"category": "service_pack",
"name": "2.2.2.26",
"product": {
"name": "2.2.2.26",
"product_id": "CSAFPID-253498"
}
},
{
"category": "service_pack",
"name": "2.2.2.28",
"product": {
"name": "2.2.2.28",
"product_id": "CSAFPID-253499"
}
},
{
"category": "service_pack",
"name": "2.2.2.54",
"product": {
"name": "2.2.2.54",
"product_id": "CSAFPID-253500"
}
},
{
"category": "service_pack",
"name": "2.2.2.60",
"product": {
"name": "2.2.2.60",
"product_id": "CSAFPID-253501"
}
},
{
"category": "service_pack",
"name": "2.2.2.83",
"product": {
"name": "2.2.2.83",
"product_id": "CSAFPID-253503"
}
},
{
"category": "service_pack",
"name": "2.2.2.97",
"product": {
"name": "2.2.2.97",
"product_id": "CSAFPID-273568"
}
},
{
"category": "service_pack",
"name": "2.2.2.137",
"product": {
"name": "2.2.2.137",
"product_id": "CSAFPID-280408"
}
}
],
"category": "product_version",
"name": "2.2"
},
{
"branches": [
{
"category": "service_pack",
"name": "2.3.1.99",
"product": {
"name": "2.3.1.99",
"product_id": "CSAFPID-256167"
}
},
{
"category": "service_pack",
"name": "2.3.1.91",
"product": {
"name": "2.3.1.91",
"product_id": "CSAFPID-256169"
}
},
{
"category": "service_pack",
"name": "2.3.1.88",
"product": {
"name": "2.3.1.88",
"product_id": "CSAFPID-256170"
}
},
{
"category": "service_pack",
"name": "2.3.1.58",
"product": {
"name": "2.3.1.58",
"product_id": "CSAFPID-256174"
}
},
{
"category": "service_pack",
"name": "2.3.1.130",
"product": {
"name": "2.3.1.130",
"product_id": "CSAFPID-256175"
}
},
{
"category": "service_pack",
"name": "2.3.1.111",
"product": {
"name": "2.3.1.111",
"product_id": "CSAFPID-256176"
}
},
{
"category": "service_pack",
"name": "2.3.1.110",
"product": {
"name": "2.3.1.110",
"product_id": "CSAFPID-256177"
}
},
{
"category": "service_pack",
"name": "2.3.1.144",
"product": {
"name": "2.3.1.144",
"product_id": "CSAFPID-271836"
}
},
{
"category": "service_pack",
"name": "2.3.1.145",
"product": {
"name": "2.3.1.145",
"product_id": "CSAFPID-271837"
}
},
{
"category": "service_pack",
"name": "2.3.1.155",
"product": {
"name": "2.3.1.155",
"product_id": "CSAFPID-271838"
}
},
{
"category": "service_pack",
"name": "2.3.1.166",
"product": {
"name": "2.3.1.166",
"product_id": "CSAFPID-271839"
}
},
{
"category": "service_pack",
"name": "2.3.1.179",
"product": {
"name": "2.3.1.179",
"product_id": "CSAFPID-279079"
}
},
{
"category": "service_pack",
"name": "2.3.1.56",
"product": {
"name": "2.3.1.56",
"product_id": "CSAFPID-279083"
}
}
],
"category": "product_version",
"name": "2.3"
},
{
"branches": [
{
"category": "service_pack",
"name": "2.6.1.131",
"product": {
"name": "2.6.1.131",
"product_id": "CSAFPID-271847"
}
},
{
"category": "service_pack",
"name": "2.6.1.166",
"product": {
"name": "2.6.1.166",
"product_id": "CSAFPID-271849"
}
},
{
"category": "service_pack",
"name": "2.6.1.169",
"product": {
"name": "2.6.1.169",
"product_id": "CSAFPID-271850"
}
},
{
"category": "service_pack",
"name": "2.6.1.174",
"product": {
"name": "2.6.1.174",
"product_id": "CSAFPID-271851"
}
},
{
"category": "service_pack",
"name": "2.6.1.192",
"product": {
"name": "2.6.1.192",
"product_id": "CSAFPID-279102"
}
}
],
"category": "product_version",
"name": "2.6"
}
],
"category": "product_family",
"name": "Cisco Firepower Extensible Operating System (FXOS)"
},
{
"category": "product_name",
"name": "Cisco Firepower 9000 Series",
"product": {
"name": "Cisco Firepower 9000 Series",
"product_id": "CSAFPID-277440"
}
},
{
"category": "product_name",
"name": "Cisco Firepower 4100 Series",
"product": {
"name": "Cisco Firepower 4100 Series",
"product_id": "CSAFPID-277441"
}
}
],
"category": "vendor",
"name": "Cisco"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.1.63 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-253492:277441"
},
"product_reference": "CSAFPID-253492",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.1.70 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-253494:277440"
},
"product_reference": "CSAFPID-253494",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.1.70 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-253494:277441"
},
"product_reference": "CSAFPID-253494",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.17 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-253495:277441"
},
"product_reference": "CSAFPID-253495",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.26 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-253498:277440"
},
"product_reference": "CSAFPID-253498",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.28 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-253499:277440"
},
"product_reference": "CSAFPID-253499",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.28 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-253499:277441"
},
"product_reference": "CSAFPID-253499",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.54 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-253500:277441"
},
"product_reference": "CSAFPID-253500",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.60 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-253501:277440"
},
"product_reference": "CSAFPID-253501",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.83 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-253503:277440"
},
"product_reference": "CSAFPID-253503",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.97 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-273568:277440"
},
"product_reference": "CSAFPID-273568",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.137 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-280408:277440"
},
"product_reference": "CSAFPID-280408",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.137 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-280408:277441"
},
"product_reference": "CSAFPID-280408",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.99 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-256167:277440"
},
"product_reference": "CSAFPID-256167",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.91 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-256169:277440"
},
"product_reference": "CSAFPID-256169",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.88 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-256170:277440"
},
"product_reference": "CSAFPID-256170",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.88 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-256170:277441"
},
"product_reference": "CSAFPID-256170",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.58 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-256174:277440"
},
"product_reference": "CSAFPID-256174",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.58 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-256174:277441"
},
"product_reference": "CSAFPID-256174",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.130 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-256175:277441"
},
"product_reference": "CSAFPID-256175",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.111 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-256176:277440"
},
"product_reference": "CSAFPID-256176",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.111 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-256176:277441"
},
"product_reference": "CSAFPID-256176",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.110 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-256177:277441"
},
"product_reference": "CSAFPID-256177",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.144 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271836:277441"
},
"product_reference": "CSAFPID-271836",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.145 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271837:277441"
},
"product_reference": "CSAFPID-271837",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.155 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-271838:277440"
},
"product_reference": "CSAFPID-271838",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.166 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-271839:277440"
},
"product_reference": "CSAFPID-271839",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.179 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-279079:277441"
},
"product_reference": "CSAFPID-279079",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.56 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-279083:277441"
},
"product_reference": "CSAFPID-279083",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.131 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-271847:277440"
},
"product_reference": "CSAFPID-271847",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.131 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271847:277441"
},
"product_reference": "CSAFPID-271847",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.166 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271849:277441"
},
"product_reference": "CSAFPID-271849",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.169 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-271850:277440"
},
"product_reference": "CSAFPID-271850",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.169 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271850:277441"
},
"product_reference": "CSAFPID-271850",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.174 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271851:277441"
},
"product_reference": "CSAFPID-271851",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.192 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-279102:277440"
},
"product_reference": "CSAFPID-279102",
"relates_to_product_reference": "CSAFPID-277440"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-3455",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvt31171"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-253492:277441",
"CSAFPID-253494:277440",
"CSAFPID-253494:277441",
"CSAFPID-253495:277441",
"CSAFPID-253498:277440",
"CSAFPID-253499:277440",
"CSAFPID-253499:277441",
"CSAFPID-253500:277441",
"CSAFPID-253501:277440",
"CSAFPID-253503:277440",
"CSAFPID-256167:277440",
"CSAFPID-256169:277440",
"CSAFPID-256170:277440",
"CSAFPID-256170:277441",
"CSAFPID-256174:277440",
"CSAFPID-256174:277441",
"CSAFPID-256175:277441",
"CSAFPID-256176:277440",
"CSAFPID-256176:277441",
"CSAFPID-256177:277441",
"CSAFPID-271836:277441",
"CSAFPID-271837:277441",
"CSAFPID-271838:277440",
"CSAFPID-271839:277440",
"CSAFPID-271847:277440",
"CSAFPID-271847:277441",
"CSAFPID-271849:277441",
"CSAFPID-271850:277440",
"CSAFPID-271850:277441",
"CSAFPID-271851:277441",
"CSAFPID-273568:277440",
"CSAFPID-279079:277441",
"CSAFPID-279083:277441",
"CSAFPID-279102:277440",
"CSAFPID-280408:277440",
"CSAFPID-280408:277441"
]
},
"release_date": "2020-10-21T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-253492:277441",
"CSAFPID-253494:277440",
"CSAFPID-253494:277441",
"CSAFPID-253495:277441",
"CSAFPID-253498:277440",
"CSAFPID-253499:277440",
"CSAFPID-253499:277441",
"CSAFPID-253500:277441",
"CSAFPID-253501:277440",
"CSAFPID-253503:277440",
"CSAFPID-256167:277440",
"CSAFPID-256169:277440",
"CSAFPID-256170:277440",
"CSAFPID-256170:277441",
"CSAFPID-256174:277440",
"CSAFPID-256174:277441",
"CSAFPID-256175:277441",
"CSAFPID-256176:277440",
"CSAFPID-256176:277441",
"CSAFPID-256177:277441",
"CSAFPID-271836:277441",
"CSAFPID-271837:277441",
"CSAFPID-271838:277440",
"CSAFPID-271839:277440",
"CSAFPID-271847:277440",
"CSAFPID-271847:277441",
"CSAFPID-271849:277441",
"CSAFPID-271850:277440",
"CSAFPID-271850:277441",
"CSAFPID-271851:277441",
"CSAFPID-273568:277440",
"CSAFPID-279079:277441",
"CSAFPID-279083:277441",
"CSAFPID-279102:277440",
"CSAFPID-280408:277440",
"CSAFPID-280408:277441"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-253492:277441",
"CSAFPID-253494:277440",
"CSAFPID-253494:277441",
"CSAFPID-253495:277441",
"CSAFPID-253498:277440",
"CSAFPID-253499:277440",
"CSAFPID-253499:277441",
"CSAFPID-253500:277441",
"CSAFPID-253501:277440",
"CSAFPID-253503:277440",
"CSAFPID-256167:277440",
"CSAFPID-256169:277440",
"CSAFPID-256170:277440",
"CSAFPID-256170:277441",
"CSAFPID-256174:277440",
"CSAFPID-256174:277441",
"CSAFPID-256175:277441",
"CSAFPID-256176:277440",
"CSAFPID-256176:277441",
"CSAFPID-256177:277441",
"CSAFPID-271836:277441",
"CSAFPID-271837:277441",
"CSAFPID-271838:277440",
"CSAFPID-271839:277440",
"CSAFPID-271847:277440",
"CSAFPID-271847:277441",
"CSAFPID-271849:277441",
"CSAFPID-271850:277440",
"CSAFPID-271850:277441",
"CSAFPID-271851:277441",
"CSAFPID-273568:277440",
"CSAFPID-279079:277441",
"CSAFPID-279083:277441",
"CSAFPID-279102:277440",
"CSAFPID-280408:277440",
"CSAFPID-280408:277441"
]
}
],
"title": "Cisco FXOS Software for Firepower 4100/9300 Series Appliance Secure Boot Bypass Vulnerability"
}
]
}
cisco-sa-fxos-sbbp-XTuPkYTn
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was found during internal security testing."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms.\r\n\r\nThe vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\n",
"title": "Summary"
},
{
"category": "general",
"text": "This vulnerability affects Cisco FXOS Software releases when running on the following platforms:\r\n\r\nFirepower 4100 Series Appliances\r\nFirepower 9300 Series Appliances\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n\r\nFor the Firepower 1000 Series Appliances and Firepower 2100 Series Appliances, see the following advisory:\r\n\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE\"]",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "There are no workarounds that address this vulnerability.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Fixed Releases Cisco FXOS Software Cisco FXOS Software Release First Fixed Release for This Vulnerability Earlier than 2.2 Migrate to a fixed release. 2.2 Migrate to a fixed release. 2.3 Migrate to a fixed release. 2.4 2.4.1.268 2.6 2.6.1.214 2.7 2.7.1.131 2.8 Not vulnerable.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was found during internal security testing.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
}
],
"title": "Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability",
"tracking": {
"current_release_date": "2020-10-21T16:00:00+00:00",
"generator": {
"date": "2024-05-10T22:55:06+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-fxos-sbbp-XTuPkYTn",
"initial_release_date": "2020-10-21T16:00:00+00:00",
"revision_history": [
{
"date": "2020-10-21T15:57:14+00:00",
"number": "1.0.0",
"summary": "Initial public release."
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "2.2.1.63",
"product": {
"name": "2.2.1.63",
"product_id": "CSAFPID-253492"
}
},
{
"category": "service_pack",
"name": "2.2.1.70",
"product": {
"name": "2.2.1.70",
"product_id": "CSAFPID-253494"
}
},
{
"category": "service_pack",
"name": "2.2.2.17",
"product": {
"name": "2.2.2.17",
"product_id": "CSAFPID-253495"
}
},
{
"category": "service_pack",
"name": "2.2.2.26",
"product": {
"name": "2.2.2.26",
"product_id": "CSAFPID-253498"
}
},
{
"category": "service_pack",
"name": "2.2.2.28",
"product": {
"name": "2.2.2.28",
"product_id": "CSAFPID-253499"
}
},
{
"category": "service_pack",
"name": "2.2.2.54",
"product": {
"name": "2.2.2.54",
"product_id": "CSAFPID-253500"
}
},
{
"category": "service_pack",
"name": "2.2.2.60",
"product": {
"name": "2.2.2.60",
"product_id": "CSAFPID-253501"
}
},
{
"category": "service_pack",
"name": "2.2.2.83",
"product": {
"name": "2.2.2.83",
"product_id": "CSAFPID-253503"
}
},
{
"category": "service_pack",
"name": "2.2.2.97",
"product": {
"name": "2.2.2.97",
"product_id": "CSAFPID-273568"
}
},
{
"category": "service_pack",
"name": "2.2.2.137",
"product": {
"name": "2.2.2.137",
"product_id": "CSAFPID-280408"
}
}
],
"category": "product_version",
"name": "2.2"
},
{
"branches": [
{
"category": "service_pack",
"name": "2.3.1.99",
"product": {
"name": "2.3.1.99",
"product_id": "CSAFPID-256167"
}
},
{
"category": "service_pack",
"name": "2.3.1.91",
"product": {
"name": "2.3.1.91",
"product_id": "CSAFPID-256169"
}
},
{
"category": "service_pack",
"name": "2.3.1.88",
"product": {
"name": "2.3.1.88",
"product_id": "CSAFPID-256170"
}
},
{
"category": "service_pack",
"name": "2.3.1.58",
"product": {
"name": "2.3.1.58",
"product_id": "CSAFPID-256174"
}
},
{
"category": "service_pack",
"name": "2.3.1.130",
"product": {
"name": "2.3.1.130",
"product_id": "CSAFPID-256175"
}
},
{
"category": "service_pack",
"name": "2.3.1.111",
"product": {
"name": "2.3.1.111",
"product_id": "CSAFPID-256176"
}
},
{
"category": "service_pack",
"name": "2.3.1.110",
"product": {
"name": "2.3.1.110",
"product_id": "CSAFPID-256177"
}
},
{
"category": "service_pack",
"name": "2.3.1.144",
"product": {
"name": "2.3.1.144",
"product_id": "CSAFPID-271836"
}
},
{
"category": "service_pack",
"name": "2.3.1.145",
"product": {
"name": "2.3.1.145",
"product_id": "CSAFPID-271837"
}
},
{
"category": "service_pack",
"name": "2.3.1.155",
"product": {
"name": "2.3.1.155",
"product_id": "CSAFPID-271838"
}
},
{
"category": "service_pack",
"name": "2.3.1.166",
"product": {
"name": "2.3.1.166",
"product_id": "CSAFPID-271839"
}
},
{
"category": "service_pack",
"name": "2.3.1.179",
"product": {
"name": "2.3.1.179",
"product_id": "CSAFPID-279079"
}
},
{
"category": "service_pack",
"name": "2.3.1.56",
"product": {
"name": "2.3.1.56",
"product_id": "CSAFPID-279083"
}
}
],
"category": "product_version",
"name": "2.3"
},
{
"branches": [
{
"category": "service_pack",
"name": "2.6.1.131",
"product": {
"name": "2.6.1.131",
"product_id": "CSAFPID-271847"
}
},
{
"category": "service_pack",
"name": "2.6.1.166",
"product": {
"name": "2.6.1.166",
"product_id": "CSAFPID-271849"
}
},
{
"category": "service_pack",
"name": "2.6.1.169",
"product": {
"name": "2.6.1.169",
"product_id": "CSAFPID-271850"
}
},
{
"category": "service_pack",
"name": "2.6.1.174",
"product": {
"name": "2.6.1.174",
"product_id": "CSAFPID-271851"
}
},
{
"category": "service_pack",
"name": "2.6.1.192",
"product": {
"name": "2.6.1.192",
"product_id": "CSAFPID-279102"
}
}
],
"category": "product_version",
"name": "2.6"
}
],
"category": "product_family",
"name": "Cisco Firepower Extensible Operating System (FXOS)"
},
{
"category": "product_name",
"name": "Cisco Firepower 9000 Series",
"product": {
"name": "Cisco Firepower 9000 Series",
"product_id": "CSAFPID-277440"
}
},
{
"category": "product_name",
"name": "Cisco Firepower 4100 Series",
"product": {
"name": "Cisco Firepower 4100 Series",
"product_id": "CSAFPID-277441"
}
}
],
"category": "vendor",
"name": "Cisco"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.1.63 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-253492:277441"
},
"product_reference": "CSAFPID-253492",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.1.70 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-253494:277440"
},
"product_reference": "CSAFPID-253494",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.1.70 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-253494:277441"
},
"product_reference": "CSAFPID-253494",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.17 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-253495:277441"
},
"product_reference": "CSAFPID-253495",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.26 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-253498:277440"
},
"product_reference": "CSAFPID-253498",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.28 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-253499:277440"
},
"product_reference": "CSAFPID-253499",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.28 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-253499:277441"
},
"product_reference": "CSAFPID-253499",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.54 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-253500:277441"
},
"product_reference": "CSAFPID-253500",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.60 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-253501:277440"
},
"product_reference": "CSAFPID-253501",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.83 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-253503:277440"
},
"product_reference": "CSAFPID-253503",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.97 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-273568:277440"
},
"product_reference": "CSAFPID-273568",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.137 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-280408:277440"
},
"product_reference": "CSAFPID-280408",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.2.2.137 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-280408:277441"
},
"product_reference": "CSAFPID-280408",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.99 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-256167:277440"
},
"product_reference": "CSAFPID-256167",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.91 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-256169:277440"
},
"product_reference": "CSAFPID-256169",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.88 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-256170:277440"
},
"product_reference": "CSAFPID-256170",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.88 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-256170:277441"
},
"product_reference": "CSAFPID-256170",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.58 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-256174:277440"
},
"product_reference": "CSAFPID-256174",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.58 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-256174:277441"
},
"product_reference": "CSAFPID-256174",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.130 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-256175:277441"
},
"product_reference": "CSAFPID-256175",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.111 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-256176:277440"
},
"product_reference": "CSAFPID-256176",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.111 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-256176:277441"
},
"product_reference": "CSAFPID-256176",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.110 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-256177:277441"
},
"product_reference": "CSAFPID-256177",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.144 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271836:277441"
},
"product_reference": "CSAFPID-271836",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.145 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271837:277441"
},
"product_reference": "CSAFPID-271837",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.155 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-271838:277440"
},
"product_reference": "CSAFPID-271838",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.166 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-271839:277440"
},
"product_reference": "CSAFPID-271839",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.179 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-279079:277441"
},
"product_reference": "CSAFPID-279079",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.3.1.56 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-279083:277441"
},
"product_reference": "CSAFPID-279083",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.131 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-271847:277440"
},
"product_reference": "CSAFPID-271847",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.131 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271847:277441"
},
"product_reference": "CSAFPID-271847",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.166 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271849:277441"
},
"product_reference": "CSAFPID-271849",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.169 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-271850:277440"
},
"product_reference": "CSAFPID-271850",
"relates_to_product_reference": "CSAFPID-277440"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.169 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271850:277441"
},
"product_reference": "CSAFPID-271850",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.174 when installed on Cisco Firepower 4100 Series",
"product_id": "CSAFPID-271851:277441"
},
"product_reference": "CSAFPID-271851",
"relates_to_product_reference": "CSAFPID-277441"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Cisco Firepower Extensible Operating System (FXOS) 2.6.1.192 when installed on Cisco Firepower 9000 Series",
"product_id": "CSAFPID-279102:277440"
},
"product_reference": "CSAFPID-279102",
"relates_to_product_reference": "CSAFPID-277440"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-3455",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvt31171"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-253492:277441",
"CSAFPID-253494:277440",
"CSAFPID-253494:277441",
"CSAFPID-253495:277441",
"CSAFPID-253498:277440",
"CSAFPID-253499:277440",
"CSAFPID-253499:277441",
"CSAFPID-253500:277441",
"CSAFPID-253501:277440",
"CSAFPID-253503:277440",
"CSAFPID-256167:277440",
"CSAFPID-256169:277440",
"CSAFPID-256170:277440",
"CSAFPID-256170:277441",
"CSAFPID-256174:277440",
"CSAFPID-256174:277441",
"CSAFPID-256175:277441",
"CSAFPID-256176:277440",
"CSAFPID-256176:277441",
"CSAFPID-256177:277441",
"CSAFPID-271836:277441",
"CSAFPID-271837:277441",
"CSAFPID-271838:277440",
"CSAFPID-271839:277440",
"CSAFPID-271847:277440",
"CSAFPID-271847:277441",
"CSAFPID-271849:277441",
"CSAFPID-271850:277440",
"CSAFPID-271850:277441",
"CSAFPID-271851:277441",
"CSAFPID-273568:277440",
"CSAFPID-279079:277441",
"CSAFPID-279083:277441",
"CSAFPID-279102:277440",
"CSAFPID-280408:277440",
"CSAFPID-280408:277441"
]
},
"release_date": "2020-10-21T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-253492:277441",
"CSAFPID-253494:277440",
"CSAFPID-253494:277441",
"CSAFPID-253495:277441",
"CSAFPID-253498:277440",
"CSAFPID-253499:277440",
"CSAFPID-253499:277441",
"CSAFPID-253500:277441",
"CSAFPID-253501:277440",
"CSAFPID-253503:277440",
"CSAFPID-256167:277440",
"CSAFPID-256169:277440",
"CSAFPID-256170:277440",
"CSAFPID-256170:277441",
"CSAFPID-256174:277440",
"CSAFPID-256174:277441",
"CSAFPID-256175:277441",
"CSAFPID-256176:277440",
"CSAFPID-256176:277441",
"CSAFPID-256177:277441",
"CSAFPID-271836:277441",
"CSAFPID-271837:277441",
"CSAFPID-271838:277440",
"CSAFPID-271839:277440",
"CSAFPID-271847:277440",
"CSAFPID-271847:277441",
"CSAFPID-271849:277441",
"CSAFPID-271850:277440",
"CSAFPID-271850:277441",
"CSAFPID-271851:277441",
"CSAFPID-273568:277440",
"CSAFPID-279079:277441",
"CSAFPID-279083:277441",
"CSAFPID-279102:277440",
"CSAFPID-280408:277440",
"CSAFPID-280408:277441"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-253492:277441",
"CSAFPID-253494:277440",
"CSAFPID-253494:277441",
"CSAFPID-253495:277441",
"CSAFPID-253498:277440",
"CSAFPID-253499:277440",
"CSAFPID-253499:277441",
"CSAFPID-253500:277441",
"CSAFPID-253501:277440",
"CSAFPID-253503:277440",
"CSAFPID-256167:277440",
"CSAFPID-256169:277440",
"CSAFPID-256170:277440",
"CSAFPID-256170:277441",
"CSAFPID-256174:277440",
"CSAFPID-256174:277441",
"CSAFPID-256175:277441",
"CSAFPID-256176:277440",
"CSAFPID-256176:277441",
"CSAFPID-256177:277441",
"CSAFPID-271836:277441",
"CSAFPID-271837:277441",
"CSAFPID-271838:277440",
"CSAFPID-271839:277440",
"CSAFPID-271847:277440",
"CSAFPID-271847:277441",
"CSAFPID-271849:277441",
"CSAFPID-271850:277440",
"CSAFPID-271850:277441",
"CSAFPID-271851:277441",
"CSAFPID-273568:277440",
"CSAFPID-279079:277441",
"CSAFPID-279083:277441",
"CSAFPID-279102:277440",
"CSAFPID-280408:277440",
"CSAFPID-280408:277441"
]
}
],
"title": "Cisco FXOS Software for Firepower 4100/9300 Series Appliance Secure Boot Bypass Vulnerability"
}
]
}
CERTFR-2020-AVI-671
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Cisco ASA versions 9.14.x antérieures à 9.14.1.30 | ||
| Cisco | N/A | Cisco ASA versions antérieures à 9.6.4.45 | ||
| Cisco | N/A | Cisco ASA versions 9.13.x antérieures à 9.13.1.13 | ||
| Cisco | N/A | Cisco FMC versions antérieures à 6.6.1 | ||
| Cisco | N/A | Cisco ASA versions 9.12.x antérieures à 9.12.4.4 | ||
| Cisco | N/A | Cisco FTD versions antérieures à 6.6.1 | ||
| Cisco | N/A | Cisco ASA versions 9.9.x antérieures à 9.9.2.80 | ||
| Cisco | N/A | Cisco FXOS versions 2.6.x antérieures à 2.6.1.214 | ||
| Cisco | N/A | Cisco FXOS versions 2.7.x antérieures à 2.7.1.131 | ||
| Cisco | N/A | Cisco FXOS versions antérieures à 2.4.1.268 | ||
| Cisco | N/A | Cisco ASA versions 9.10.x antérieures à 9.10.1.44 | ||
| Cisco | N/A | Cisco ASA versions 9.7.x et 9.8.x antérieures à 9.8.4.29 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco ASA versions 9.14.x ant\u00e9rieures \u00e0 9.14.1.30",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions ant\u00e9rieures \u00e0 9.6.4.45",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions 9.13.x ant\u00e9rieures \u00e0 9.13.1.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco FMC versions ant\u00e9rieures \u00e0 6.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions 9.12.x ant\u00e9rieures \u00e0 9.12.4.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco FTD versions ant\u00e9rieures \u00e0 6.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions 9.9.x ant\u00e9rieures \u00e0 9.9.2.80",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco FXOS versions 2.6.x ant\u00e9rieures \u00e0 2.6.1.214",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco FXOS versions 2.7.x ant\u00e9rieures \u00e0 2.7.1.131",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco FXOS versions ant\u00e9rieures \u00e0 2.4.1.268",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions 9.10.x ant\u00e9rieures \u00e0 9.10.1.44",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA versions 9.7.x et 9.8.x ant\u00e9rieures \u00e0 9.8.4.29",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-3514",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3514"
},
{
"name": "CVE-2020-3562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3562"
},
{
"name": "CVE-2020-3456",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3456"
},
{
"name": "CVE-2020-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3499"
},
{
"name": "CVE-2020-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3550"
},
{
"name": "CVE-2020-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3549"
},
{
"name": "CVE-2020-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3577"
},
{
"name": "CVE-2020-3373",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3373"
},
{
"name": "CVE-2020-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3572"
},
{
"name": "CVE-2020-3458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3458"
},
{
"name": "CVE-2020-3304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3304"
},
{
"name": "CVE-2020-3533",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3533"
},
{
"name": "CVE-2020-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3554"
},
{
"name": "CVE-2020-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3529"
},
{
"name": "CVE-2020-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3436"
},
{
"name": "CVE-2020-3455",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3455"
},
{
"name": "CVE-2020-3528",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3528"
},
{
"name": "CVE-2020-3571",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3571"
},
{
"name": "CVE-2020-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3563"
},
{
"name": "CVE-2020-3410",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3410"
}
],
"initial_release_date": "2020-10-22T00:00:00",
"last_revision_date": "2020-10-22T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-671",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-10-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-sslvpndma-dos-HRrqB9Yx du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-sslvpndma-dos-HRrqB9Yx"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fxos-sbbyp-KqP6NgrE du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-inline-dos-nXqUyEqM du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-inline-dos-nXqUyEqM"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-icmp-dos-hxxcycM du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-icmp-dos-hxxcycM"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-dos-QFcNEPfx du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dos-QFcNEPfx"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-frag-memleak-mCtqdP9n du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-frag-memleak-mCtqdP9n"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftdfmc-sft-mitm-tc8AzFs2 du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-ssl-dcrpt-dos-RYEkX4yy du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ssl-dcrpt-dos-RYEkX4yy"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-fileup-dos-zvC7wtys du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-fileup-dos-zvC7wtys"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-ftd-tcp-dos-N3DMnU4T du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-tcp-dos-N3DMnU4T"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-cacauthbyp-NCLGZm3Q du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cacauthbyp-NCLGZm3Q"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-snmp-dos-R8ENPbOs du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snmp-dos-R8ENPbOs"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftdfmc-dirtrav-NW8XcuSB du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dirtrav-NW8XcuSB"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-container-esc-FmYqFBQV du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-container-esc-FmYqFBQV"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-tcp-dos-GDcZDqAf du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tcp-dos-GDcZDqAf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fxos-sbbp-XTuPkYTn du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fxosfcm-csrf-uhO4e5BZ du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxosfcm-csrf-uhO4e5BZ"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-ospflls-37Xy2q6r du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ospflls-37Xy2q6r"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asaftd-webdos-fBzM5Ynw du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webdos-fBzM5Ynw"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftdfmc-dos-NjYvDcLA du 21 octobre 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dos-NjYvDcLA"
}
]
}
gsd-2020-3455
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2020-3455",
"description": "A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.",
"id": "GSD-2020-3455"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-3455"
],
"details": "A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.",
"id": "GSD-2020-3455",
"modified": "2023-12-13T01:22:10.471071Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-10-21T16:00:00",
"ID": "CVE-2020-3455",
"STATE": "PUBLIC",
"TITLE": "Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Firepower Extensible Operating System (FXOS) ",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "6.7",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-693"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20201021 Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
}
]
},
"source": {
"advisory": "cisco-sa-fxos-sbbp-XTuPkYTn",
"defect": [
[
"CSCvt31171"
]
],
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.4.1.268",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.6.1.214",
"versionStartIncluding": "2.6",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.7.1.131",
"versionStartIncluding": "2.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_9300_sm-24:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_9300_sm-36:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_9300_sm-40:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_9300_sm-44:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_9300_sm-44_x_3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_9300_sm-48:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_9300_sm-56:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_9300_sm-56_x_3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2020-3455"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20201021 Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability",
"refsource": "CISCO",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-10-28T20:52Z",
"publishedDate": "2020-10-21T19:15Z"
}
}
}
ghsa-4c77-wcw2-9gh7
Vulnerability from github
A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.
{
"affected": [],
"aliases": [
"CVE-2020-3455"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-10-21T19:15:00Z",
"severity": "HIGH"
},
"details": "A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.",
"id": "GHSA-4c77-wcw2-9gh7",
"modified": "2022-05-24T17:31:46Z",
"published": "2022-05-24T17:31:46Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3455"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
}
],
"schema_version": "1.4.0",
"severity": []
}
var-202010-1024
Vulnerability from variot
A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots. Cisco FXOS There are unspecified vulnerabilities in the software.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco FXOS Software is a set of firewall software that runs in Cisco security devices from Cisco. The process will be executed every time it boots and will remain persistent during reboot
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202010-1024",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "firepower extensible operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.7.1.131"
},
{
"model": "firepower extensible operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.6.1.214"
},
{
"model": "firepower extensible operating system",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "2.7"
},
{
"model": "firepower extensible operating system",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "2.6"
},
{
"model": "firepower extensible operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.4.1.268"
},
{
"model": "cisco firepower extensible operating system",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
"version": null
},
{
"model": "cisco firepower extensible operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
"version": null
},
{
"model": "fxos",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-72732"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-012611"
},
{
"db": "NVD",
"id": "CVE-2020-3455"
}
]
},
"cve": "CVE-2020-3455",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2020-3455",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2020-72732",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-3455",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ykramarz@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2020-3455",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-3455",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-3455",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "ykramarz@cisco.com",
"id": "CVE-2020-3455",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2020-3455",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-72732",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202010-1148",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-3455",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-72732"
},
{
"db": "VULMON",
"id": "CVE-2020-3455"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-012611"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-1148"
},
{
"db": "NVD",
"id": "CVE-2020-3455"
},
{
"db": "NVD",
"id": "CVE-2020-3455"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots. Cisco FXOS There are unspecified vulnerabilities in the software.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco FXOS Software is a set of firewall software that runs in Cisco security devices from Cisco. The process will be executed every time it boots and will remain persistent during reboot",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-3455"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-012611"
},
{
"db": "CNVD",
"id": "CNVD-2020-72732"
},
{
"db": "VULMON",
"id": "CVE-2020-3455"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-3455",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2020-012611",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2020-72732",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "50201",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.3643",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202010-1148",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2020-3455",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-72732"
},
{
"db": "VULMON",
"id": "CVE-2020-3455"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-012611"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-1148"
},
{
"db": "NVD",
"id": "CVE-2020-3455"
}
]
},
"id": "VAR-202010-1024",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-72732"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-72732"
}
]
},
"last_update_date": "2024-11-23T22:16:17.768000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-fxos-sbbp-XTuPkYTn",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn"
},
{
"title": "Patch for Cisco FXOS Secure Boot Bypass Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/242263"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-72732"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-012611"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-693",
"trust": 1.0
},
{
"problemtype": "Other (CWE-Other) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-012611"
},
{
"db": "NVD",
"id": "CVE-2020-3455"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-3455"
},
{
"trust": 1.7,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-fxos-sbbp-xtupkytn"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/50201"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.3643/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-72732"
},
{
"db": "VULMON",
"id": "CVE-2020-3455"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-012611"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-1148"
},
{
"db": "NVD",
"id": "CVE-2020-3455"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2020-72732"
},
{
"db": "VULMON",
"id": "CVE-2020-3455"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-012611"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-1148"
},
{
"db": "NVD",
"id": "CVE-2020-3455"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-12-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-72732"
},
{
"date": "2020-10-21T00:00:00",
"db": "VULMON",
"id": "CVE-2020-3455"
},
{
"date": "2021-05-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-012611"
},
{
"date": "2020-10-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202010-1148"
},
{
"date": "2020-10-21T19:15:16.170000",
"db": "NVD",
"id": "CVE-2020-3455"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-12-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-72732"
},
{
"date": "2020-10-28T00:00:00",
"db": "VULMON",
"id": "CVE-2020-3455"
},
{
"date": "2021-05-17T09:06:00",
"db": "JVNDB",
"id": "JVNDB-2020-012611"
},
{
"date": "2020-11-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202010-1148"
},
{
"date": "2024-11-21T05:31:06.197000",
"db": "NVD",
"id": "CVE-2020-3455"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202010-1148"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco\u00a0FXOS\u00a0 Software vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-012611"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202010-1148"
}
],
"trust": 0.6
}
}
cnvd-2020-72732
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn
| Name | Cisco FXOS |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-3455",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-3455"
}
},
"description": "Cisco FXOS Software\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u8fd0\u884c\u5728\u601d\u79d1\u5b89\u5168\u8bbe\u5907\u4e2d\u7684\u9632\u706b\u5899\u8f6f\u4ef6\u3002\n\nCisco FXOS\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5b89\u5168\u5f15\u5bfc\u8fc7\u7a0b\u7684\u4fdd\u62a4\u4e0d\u591f\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7834\u574f\u4fe1\u4efb\u94fe\uff0c\u5e76\u5c06\u4ee3\u7801\u6ce8\u5165\u8bbe\u5907\u7684\u5f15\u5bfc\u8fc7\u7a0b\u4e2d\uff0c\u8be5\u8fc7\u7a0b\u5c06\u5728\u6bcf\u6b21\u5f15\u5bfc\u65f6\u6267\u884c\uff0c\u5e76\u5728\u91cd\u65b0\u5f15\u5bfc\u65f6\u4fdd\u6301\u6301\u4e45\u6027\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-72732",
"openTime": "2020-12-19",
"patchDescription": "Cisco FXOS Software\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u8fd0\u884c\u5728\u601d\u79d1\u5b89\u5168\u8bbe\u5907\u4e2d\u7684\u9632\u706b\u5899\u8f6f\u4ef6\u3002\r\n\r\nCisco FXOS\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5b89\u5168\u5f15\u5bfc\u8fc7\u7a0b\u7684\u4fdd\u62a4\u4e0d\u591f\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7834\u574f\u4fe1\u4efb\u94fe\uff0c\u5e76\u5c06\u4ee3\u7801\u6ce8\u5165\u8bbe\u5907\u7684\u5f15\u5bfc\u8fc7\u7a0b\u4e2d\uff0c\u8be5\u8fc7\u7a0b\u5c06\u5728\u6bcf\u6b21\u5f15\u5bfc\u65f6\u6267\u884c\uff0c\u5e76\u5728\u91cd\u65b0\u5f15\u5bfc\u65f6\u4fdd\u6301\u6301\u4e45\u6027\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco FXOS\u5b89\u5168\u542f\u52a8\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Cisco FXOS"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-3455",
"serverity": "\u9ad8",
"submitTime": "2020-10-26",
"title": "Cisco FXOS\u5b89\u5168\u542f\u52a8\u7ed5\u8fc7\u6f0f\u6d1e"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.