Cisco FireSIGHT System ソフトウェアにおける保護メカニズムの不具合に関する脆弱性
| Title |
Cisco FireSIGHT System ソフトウェアにおける保護メカニズムの不具合に関する脆弱性
|
| Summary |
Cisco FireSIGHT System ソフトウェアには、保護メカニズムの不具合に関する脆弱性が存在します。 ベンダは、本脆弱性を Bug ID CSCvh49388 として公開しています。
|
| Possible impacts |
情報を取得される可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
June 6, 2018, midnight |
| Registration Date |
Aug. 7, 2018, 4:28 p.m. |
| Last Update |
Aug. 7, 2018, 4:28 p.m. |
|
CVSS3.0 : 警告
|
| Score |
5.8
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N |
|
CVSS2.0 : 警告
|
| Score |
5
|
| Vector |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
Affected System
| シスコシステムズ |
|
Cisco FirePOWER Management Center
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年08月07日] 掲載 |
Aug. 7, 2018, 4:28 p.m. |
NVD Vulnerability Information
CVE-2018-0333
| Summary |
A vulnerability in the VPN configuration management of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass VPN security due to unintended side effects of dynamic configuration changes that could allow an attacker to bypass configured policies. The vulnerability is due to incorrect management of the configured interface names and VPN parameters when dynamic CLI configuration changes are performed. An attacker could exploit this vulnerability by sending packets through an interface on the targeted device. A successful exploit could allow the attacker to bypass configured VPN policies. Cisco Bug IDs: CSCvh49388.
|
| Publication Date |
June 8, 2018, 6:29 a.m. |
| Registration Date |
March 1, 2021, 6:36 p.m. |
| Last Update |
Nov. 21, 2024, 12:38 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:cisco:firepower_management_center:6.2.2:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List