Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-20246

Опубликовано: 01 нояб. 2023
Источник: ubuntu
Приоритет: medium
CVSS3: 5.8

Описание

Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

code not present
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

code not present
esm-apps/noble

not-affected

code not present
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present

Показывать по

5.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.8
nvd
больше 2 лет назад

Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.

CVSS3: 5.8
debian
больше 2 лет назад

Multiple Cisco products are affected by a vulnerability in Snort acces ...

CVSS3: 5.8
github
больше 2 лет назад

Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.

CVSS3: 5.8
fstec
больше 2 лет назад

Уязвимость функции контроля доступа системы обнаружения вторжений Snort, позволяющая нарушителю обойти существующие ограничения безопасности

5.8 Medium

CVSS3