Cisco Firepower Management Center Software SSH DoS (cisco-sa-fmc-dos-OwEunWJN)

high Nessus Plugin ID 168869


The remote device is missing a vendor-supplied security patch.


The version of Cisco Firepower Threat Defense installed on the remote host is affected by a vulnerability in the processing of SSH connections of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a reboot on the affected device.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvy95520

See Also

Plugin Details

Severity: High

ID: 168869

File Name: cisco-sa-fmc-dos-OwEunWJN.nasl

Version: 1.2

Type: local

Family: CISCO

Published: 12/16/2022

Updated: 12/19/2022

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2022-20854


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:firepower_management_center

Required KB Items: Host/Cisco/firepower_mc/version

Exploit Ease: No known exploits are available

Patch Publication Date: 11/9/2022

Vulnerability Publication Date: 11/9/2022

Reference Information

CVE: CVE-2022-20854

CWE: 400

CISCO-SA: cisco-sa-fmc-dos-OwEunWJN