Medium severity5.9NVD Advisory· Published Apr 7, 2017· Updated May 13, 2026
CVE-2017-3885
CVE-2017-3885
Description
A vulnerability in the detection engine reassembly of Secure Sockets Layer (SSL) packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the Snort process consumes a high level of CPU resources. Affected Products: This vulnerability affects Cisco Firepower System Software running software releases 6.0.0, 6.1.0, 6.2.0, or 6.2.1 when the device is configured with an SSL policy that has at least one rule specifying traffic decryption. More Information: CSCvc58563. Known Affected Releases: 6.0.0 6.1.0 6.2.0 6.2.1.
Affected products
4cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.securityfocus.com/bid/97451nvdThird Party AdvisoryVDB Entry
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpwnvdVendor Advisory
News mentions
0No linked articles in our index yet.