{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T04:26:00.863","vulnerabilities":[{"cve":{"id":"CVE-2020-3188","sourceIdentifier":"psirt@cisco.com","published":"2020-05-06T17:15:12.150","lastModified":"2024-11-21T05:30:30.560","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in how Cisco Firepower Threat Defense (FTD) Software handles session timeouts for management connections could allow an unauthenticated, remote attacker to cause a buildup of remote management connections to an affected device, which could result in a denial of service (DoS) condition. The vulnerability exists because the default session timeout period for specific to-the-box remote management connections is too long. An attacker could exploit this vulnerability by sending a large and sustained number of crafted remote management connections to an affected device, resulting in a buildup of those connections over time. A successful exploit could allow the attacker to cause the remote management interface or Cisco Firepower Device Manager (FDM) to stop responding and cause other management functions to go offline, resulting in a DoS condition. The user traffic that is flowing through the device would not be affected, and the DoS condition would be isolated to remote management only."},{"lang":"es","value":"Una vulnerabilidad en como el Cisco Firepower Threat Defense (FTD) Software maneja los tiempos de espera de sesión para las conexiones de administración, podría permitir a un atacante remoto no autenticado causar una acumulación de conexiones de administración remota en un dispositivo afectado, lo que podría resultar en una condición de denegación de servicio (DoS). La vulnerabilidad se presenta porque el período de tiempo de espera de la sesión predeterminada para conexiones de administración remota específicas es demasiado largo. Un atacante podría explotar esta vulnerabilidad mediante el envío de un número grande y sostenido de conexiones de administración remota diseñadas sobre un dispositivo afectado, resultando en una acumulación de esas conexiones sobre el tiempo. Una explotación con éxito podría permitir a un atacante causar que la interfaz de administración remota o el Cisco Firepower Device Manager (FDM) dejen de responder y cause que otras funciones de administración se desconecten, resultando en una condición DoS. El tráfico del usuario que fluye a través del dispositivo no estaría afectado, y la condición DoS estaría aislada para la administración remota solamente."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-399"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-613"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndExcluding":"6.4.0.9","matchCriteriaId":"06741056-2BFD-4F88-917A-F581F813B69E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5.0","versionEndExcluding":"6.5.0.5","matchCriteriaId":"3ED0E59C-146C-494F-AD46-F6FB43F9C575"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5505_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"D20B7556-CB33-4E96-8B4A-4E70C350079D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5505_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"51DFD14D-033B-4AA3-B7C6-E5CE9EEF69DD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*","matchCriteriaId":"8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5510_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"4DC4AD47-1789-494E-949F-483CBC2EDF4A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5510_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"4A9AF36E-F7F0-4A0E-B95D-2DF5584D5072"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*","matchCriteriaId":"B091B9BA-D4CA-435B-8D66-602B45F0E0BD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5512-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"39AC2543-8397-4CAD-A87C-10AD2F5672A2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5512-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"70CC1F85-2E5C-4939-9879-417484C58F5A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*","matchCriteriaId":"08F0F160-DAD2-48D4-B7B2-4818B2526F35"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5515-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"715FA7AF-438C-4B73-B411-F5242D82E6DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5515-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"028C5F69-DBAB-42DA-A759-555FACE4CF08"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*","matchCriteriaId":"977D597B-F6DE-4438-AB02-06BE64D71EBE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5520_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"1C833630-408A-4491-88E3-F8F50BC0988E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5520_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"AD20CA7A-9EF1-4BA5-883E-EB9791AB1982"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*","matchCriteriaId":"2B387F62-6341-434D-903F-9B72E7F84ECB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5525-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"400F4C4E-75A0-420C-A3D0-35EBCA9439C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5525-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"76F77E11-71F3-4197-871F-FEA1E53D7CFB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*","matchCriteriaId":"EB71EB29-0115-4307-A9F7-262394FD9FB0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5540_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"28EE51A4-C914-4B9C-B483-A56E0AAA788F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5540_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"33A3EB45-FDC6-4BAB-9E6D-96A463C1A9B3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*","matchCriteriaId":"17C5A524-E1D9-480F-B655-0680AA5BF720"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5545-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"BA31C6C9-EC1F-4548-AF39-FD49DD98BBBE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5545-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"2AA06D7D-A0BA-4B17-9EF3-165A203F8921"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*","matchCriteriaId":"57179F60-E330-4FF0-9664-B1E4637FF210"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5550_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"7C6DCED6-241A-4FB6-B2A4-B4E4DD3B7547"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5550_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"414DE2B9-AE0A-4DE4-9D0A-8C1E11AF85D3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*","matchCriteriaId":"E6287D95-F564-44B7-A0F9-91396D7C2C4E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5555-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"611D736A-1C49-4FF7-BC6B-01D735771450"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5555-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"3E584FE6-A477-4EFE-B562-35FC65229F26"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*","matchCriteriaId":"5535C936-391B-4619-AA03-B35265FC15D7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5580_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"E2CBAFBF-8727-43F3-9C9E-E3CCCF93BE29"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5580_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"B400A5F1-2DDA-4881-AB68-3F59262C981D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*","matchCriteriaId":"D1E828B8-5ECC-4A09-B2AD-DEDC558713DE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5585-x_firmware:9.8\\(3\\):*:*:*:*:*:*:*","matchCriteriaId":"AE020E81-C231-4975-9695-ECE383C32B2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:asa_5585-x_firmware:101.6\\(1.96\\):*:*:*:*:*:*:*","matchCriteriaId":"C8D5DAF8-D27D-41A7-9912-580D657557E0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*","matchCriteriaId":"16AE20C2-C77E-4E04-BF13-A48696E52426"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}