Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9hv9-j7p5-6w36

Опубликовано: 01 нояб. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 5.8

Описание

Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.

Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.

EPSS

Процентиль: 20%
0.00065
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-290

Связанные уязвимости

CVSS3: 5.8
ubuntu
больше 2 лет назад

Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.

CVSS3: 5.8
nvd
больше 2 лет назад

Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.

CVSS3: 5.8
debian
больше 2 лет назад

Multiple Cisco products are affected by a vulnerability in Snort acces ...

CVSS3: 5.8
fstec
больше 2 лет назад

Уязвимость функции контроля доступа системы обнаружения вторжений Snort, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 20%
0.00065
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-290