Symptom
This product includes a version of OpenSSL that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2020-1971
This bug was opened to address the potential impact on this product.
Conditions
Exploitation of this vulnerability in the product in question is possible only through the CRL verification vector, however the CRL verification for a received certificate is performed exclusively after verifying the signature of the certificate, so attacker in order to be able to exploit this vulnerability would need to be capable to generate a malicious certificate with a valid signature by a certification authority trusted by the target device, this significantly increases the difficulty of exploitation.
Workaround
Not available or not applicable.
Further Problem Description
None
PSIRT Evaluation
The Cisco PSIRT has assigned this bug the following CVSS version 3 score. The Base CVSS score as of the time of evaluation is 5.9:
https://tools.cisco.com/security/center/cvssCalculator.x?vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE ID CVE-2020-1971 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html