Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-20767

Опубликовано: 03 мая 2022
Источник: nvd
CVSS3: 8.6
CVSS3: 7.5
CVSS2: 7.8
EPSS Низкий

Описание

A vulnerability in the Snort rule evaluation function of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of the DNS reputation enforcement rule. An attacker could exploit this vulnerability by sending crafted UDP packets through an affected device to force a buildup of UDP connections. A successful exploit could allow the attacker to cause traffic that is going through the affected device to be dropped, resulting in a DoS condition. Note: This vulnerability only affects Cisco FTD devices that are running Snort 3.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
Версия до 7.0.2 (исключая)
cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*

EPSS

Процентиль: 80%
0.01349
Низкий

8.6 High

CVSS3

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-399
CWE-770

Связанные уязвимости

CVSS3: 8.6
ubuntu
почти 4 года назад

A vulnerability in the Snort rule evaluation function of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of the DNS reputation enforcement rule. An attacker could exploit this vulnerability by sending crafted UDP packets through an affected device to force a buildup of UDP connections. A successful exploit could allow the attacker to cause traffic that is going through the affected device to be dropped, resulting in a DoS condition. Note: This vulnerability only affects Cisco FTD devices that are running Snort 3.

CVSS3: 7.5
github
почти 4 года назад

A vulnerability in the Snort rule evaluation function of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of the DNS reputation enforcement rule. An attacker could exploit this vulnerability by sending crafted UDP packets through an affected device to force a buildup of UDP connections. A successful exploit could allow the attacker to cause traffic that is going through the affected device to be dropped, resulting in a DoS condition. Note: This vulnerability only affects Cisco FTD devices that are running Snort 3.

CVSS3: 8.6
fstec
больше 4 лет назад

Уязвимость функционала оценки правил системы обнаружения вторжений Snort микропрограммного обеспечения межсетевых экранов Cisco Firepower Threat Defense (FTD), позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 80%
0.01349
Низкий

8.6 High

CVSS3

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-399
CWE-770