{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T07:49:27.313","vulnerabilities":[{"cve":{"id":"CVE-2017-6766","sourceIdentifier":"psirt@cisco.com","published":"2017-08-07T06:29:00.730","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Secure Sockets Layer (SSL) Decryption and Inspection feature of Cisco Firepower System Software 5.4.0, 5.4.1, 6.0.0, 6.1.0, 6.2.0, 6.2.1, and 6.2.2 could allow an unauthenticated, remote attacker to bypass the SSL policy for decrypting and inspecting traffic on an affected system. The vulnerability is due to unexpected interaction with Known Key and Decrypt and Resign configuration settings of SSL policies when the affected software receives unexpected SSL packet headers. An attacker could exploit this vulnerability by sending a crafted SSL packet through an affected device in a valid SSL session. A successful exploit could allow the attacker to bypass the SSL decryption and inspection policy for the affected system, which could allow traffic to flow through the system without being inspected. Cisco Bug IDs: CSCve12652."},{"lang":"es","value":"Una vulnerabilidad en la funcionalidad Secure Sockets Layer (SSL) Decryption and Inspection de Cisco Firepower System Software 5.4.0, 5.4.1, 6.0.0, 6.1.0, 6.2.0, 6.2.1 y 6.2.2 podría permitir que un atacante remoto sin autenticar eluda la política SSL para descifrar e inspeccionar tráfico en un sistema afectado. La vulnerabilidad se debe a una interacción inesperada con las opciones de configuración Known Key y Decrypt and Resign de las políticas SSL cuando el software afectado recibe cabeceras de paquetes SSL inesperadas. Un atacante podría explotar esta vulnerabilidad mediante el envío de un paquete SSL manipulado a través de un dispositivo afectado en una sesión SSL válida. Si se explota esta vulnerabilidad con éxito, el atacante podría eludir la política de descifrado e inspección SSL para el sistema afectado, lo que podría permitir que el tráfico fluyese a través del sistema sin ser inspeccionado. Cisco Bug IDs: CSCve12652."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-310"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firesight_system_software:5.4.0:*:*:*:*:*:*:*","matchCriteriaId":"0EB13B96-D431-49BD-ADAB-9AE5DB559935"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firesight_system_software:5.4.1:*:*:*:*:*:*:*","matchCriteriaId":"B7DC251B-1CA8-4232-A900-885933E01FB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firesight_system_software:6.0.0:*:*:*:*:*:*:*","matchCriteriaId":"55D52DB0-4441-41C9-900E-DE917B0CBC91"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firesight_system_software:6.1.0:*:*:*:*:*:*:*","matchCriteriaId":"362E320D-70E9-4B51-9298-ADF612FD440F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firesight_system_software:6.2.0:*:*:*:*:*:*:*","matchCriteriaId":"A67A5C44-A26D-44A3-9674-92657FBA0513"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firesight_system_software:6.2.1:*:*:*:*:*:*:*","matchCriteriaId":"DFBDE0A2-5ECA-4287-8A70-235C1E17FA68"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firesight_system_software:6.2.2:*:*:*:*:*:*:*","matchCriteriaId":"4153DE2F-B331-4FA6-B16D-3C2D975FD887"}]}]}],"references":[{"url":"https://quickview.cloudapps.cisco.com/quickview/bug/CSCve12652","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-fpw","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://quickview.cloudapps.cisco.com/quickview/bug/CSCve12652","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-fpw","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}