Description Preview
Overview
This vulnerability (CVE-2023-20177) affects Cisco Firepower Threat Defense Software when using the Snort 3 detection engine with either:
- URL Category configured on the SSL file policy, or
- URL Category configured on an access control policy with TLS server identity discovery enabled
The vulnerability is triggered by a logic error in the inspection process of SSL/TLS connections under these specific configurations. When exploited, the Snort 3 detection engine unexpectedly restarts, which can lead to two possible security impacts:
- Security bypass: Traffic may pass uninspected during the restart period
- Denial of service: Network traffic inspection may be temporarily unavailable
The vulnerability requires no authentication and can be exploited remotely by sending specially crafted SSL/TLS connections through the affected device.
Remediation
To address this vulnerability, organizations should:
-
Update to a patched version of Cisco Firepower Threat Defense Software as recommended in the Cisco Security Advisory (cisco-sa-sa-ftd-snort3-urldos-OccFQTeX).
-
If immediate patching is not possible, consider these mitigations:
- Disable URL Category configurations in SSL file policies
- Disable URL Category configurations in access control policies when TLS server identity discovery is enabled
- Implement network segmentation to limit exposure of affected devices
- Monitor for unexpected Snort 3 detection engine restarts which may indicate exploitation attempts
-
After patching, verify proper operation of the Snort 3 detection engine and SSL/TLS inspection capabilities.
References
- Cisco Security Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-ftd-snort3-urldos-OccFQTeX
- MITRE CVE Entry: CVE-2023-20177
- Cisco Firepower Threat Defense Documentation: https://www.cisco.com/c/en/us/products/security/firepower-ngfw/index.html
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade