Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-09354

Опубликовано: 08 нояб. 2023
Источник: fstec
CVSS3: 6.5
CVSS2: 6.4
EPSS Низкий

Описание

Уязвимость системы предотвращения вторжений Cisco Unified Threat Defense Snort Intrusion Prevention System Engine операционной системы Cisco IOS XE связана с выходом операции за границы буфера в памяти. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, обойти существующие ограничения безопасности и вызвать отказ в обслуживании путем отправки специально созданного HTTP-запроса

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco Unified Threat Defense Snort Intrusion Prevention System Engine

Версия ПО

от 17.12 до 17.12.4 (Cisco Unified Threat Defense Snort Intrusion Prevention System Engine)
от 17.13 до 17.14 (Cisco Unified Threat Defense Snort Intrusion Prevention System Engine)

Тип ПО

Сетевое средство

Операционные системы и аппаратные платформы

Cisco Systems Inc. Cisco IOS XE -
Cisco Systems Inc. Cisco IOS XE -
Cisco Systems Inc. Cisco IOS XE -
Cisco Systems Inc. Cisco IOS XE -
Cisco Systems Inc. Cisco IOS XE -
Cisco Systems Inc. Cisco IOS XE -
Cisco Systems Inc. Cisco IOS XE -

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,4)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 6,5)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-utd-snort3-dos-bypas-b4OUEwxD

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 7%
0.00026
Низкий

6.5 Medium

CVSS3

6.4 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.8
nvd
больше 1 года назад

A vulnerability in Cisco Unified Threat Defense (UTD) Snort Intrusion Prevention System (IPS) Engine for Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured security policies or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of HTTP requests when they are processed by Cisco UTD Snort IPS Engine. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process. If the action in case of Cisco UTD Snort IPS Engine failure is set to the default, fail-open, successful exploitation of this vulnerability could allow the attacker to bypass configured security policies. If the action in case of Cisco UTD Snort IPS Engine failure is set to fail-close, successful exploitation of this vulnerability could cause traffic that is configured to be inspected by Cis

CVSS3: 5.8
github
больше 1 года назад

A vulnerability in Cisco Unified Threat Defense (UTD) Snort Intrusion Prevention System (IPS) Engine for Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured security policies or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of HTTP requests when they are processed by Cisco UTD Snort IPS Engine. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process. If the action in case of Cisco UTD Snort IPS Engine failure is set to the default, fail-open, successful exploitation of this vulnerability could allow the attacker to bypass configured security policies. If the action in case of Cisco UTD Snort IPS Engine failure is set to fail-close, successful exploitation of this vulnerability could cause traffic that is configured to be inspected by Ci...

EPSS

Процентиль: 7%
0.00026
Низкий

6.5 Medium

CVSS3

6.4 Medium

CVSS2