CVE-2023-20083

8.6 HIGH

📋 TL;DR

A vulnerability in Cisco Firepower Threat Defense (FTD) Software's ICMPv6 inspection with Snort 2 allows remote attackers to cause 100% CPU usage via crafted ICMPv6 packets, resulting in a denial of service that stops all traffic processing. Only FTD devices using Snort 2 detection engine with ICMPv6 inspection enabled are affected. Management traffic remains unaffected during exploitation.

💻 Affected Systems

Products:
  • Cisco Firepower Threat Defense (FTD) Software
Versions: Versions prior to 7.2.5, 7.0.9, and 6.7.0.15
Operating Systems: FTD-specific OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when ICMPv6 inspection is configured with Snort 2 detection engine. Snort 3 is not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete traffic processing halt requiring device or Snort engine restart to recover, causing extended network downtime.

🟠

Likely Case

Temporary DoS condition affecting data plane traffic until manual intervention restores service.

🟢

If Mitigated

Minimal impact if ICMPv6 inspection is disabled or Snort 3 is used instead.

🌐 Internet-Facing: HIGH - Remote unauthenticated attackers can exploit this from the internet if ICMPv6 traffic reaches affected devices.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they have network access to affected devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted ICMPv6 packets through the device, which is straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.5, 7.0.9, 6.7.0.15 or later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-icmpv6-dos-4eMkLuN

Restart Required: Yes

Instructions:

1. Download appropriate FTD software version from Cisco. 2. Deploy update via FMC or CLI. 3. Restart affected devices after patching.

🔧 Temporary Workarounds

Disable ICMPv6 Inspection

all

Temporarily disable ICMPv6 inspection in Snort 2 configuration to prevent exploitation.

configure terminal
policy-map type inspect_dns preset_dns_map
parameters
no inspect icmpv6

Migrate to Snort 3

all

Switch from Snort 2 to Snort 3 detection engine which is not vulnerable.

configure terminal
snort-engine snort3

🧯 If You Can't Patch

  • Implement network ACLs to block ICMPv6 traffic from untrusted sources
  • Monitor CPU usage spikes and have restart procedures ready for affected devices

🔍 How to Verify

Check if Vulnerable:

Check FTD version with 'show version' and verify ICMPv6 inspection is enabled in Snort 2 configuration.

Check Version:

show version | include Version

Verify Fix Applied:

Verify version is 7.2.5, 7.0.9, 6.7.0.15 or later using 'show version' command.

📡 Detection & Monitoring

Log Indicators:

  • CPU utilization spikes to 100%
  • Snort 2 process crashes or high resource usage
  • Traffic processing failures

Network Indicators:

  • Unusual ICMPv6 traffic patterns
  • Crafted ICMPv6 packets with malformed headers

SIEM Query:

source="ftd" AND (cpu_utilization>=95 OR process="snort2" AND status="failed")

🔗 References

📤 Share & Export