CVE-2021-34781
high-risk
Published 2021-10-27
A vulnerability in the processing of SSH connections for multi-instance deployments of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to a lack of proper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, which causes a DoS condition on the affected device. The device must be manually reloaded to recover.
Do I need to act?
-
0.43% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.6/10
High
NETWORK
/ LOW complexity
Affected Products (17)
Firepower Management Center Virtual Appliance
Firepower Management Center Virtual Appliance
Firepower Management Center Virtual Appliance
Firepower Management Center Virtual Appliance
Firepower Management Center Virtual Appliance
Firepower Management Center Virtual Appliance
Firepower Management Center Virtual Appliance
Firepower Management Center Virtual Appliance
Sourcefire Defense Center
Sourcefire Defense Center
Sourcefire Defense Center
Sourcefire Defense Center
Sourcefire Defense Center
Sourcefire Defense Center
Sourcefire Defense Center
Sourcefire Defense Center
Affected Vendors
References (2)
50
/ 100
high-risk
Severity
29/34 · Critical
Exploitability
2/34 · Minimal
Exposure
19/34 · Moderate