Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.
The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ios_xe | Cisco | * | 17.4.1 (excluding) |
Snort | Ubuntu | bionic | * |
Snort | Ubuntu | esm-apps/bionic | * |
Snort | Ubuntu | esm-apps/focal | * |
Snort | Ubuntu | esm-apps/xenial | * |
Snort | Ubuntu | esm-infra-legacy/trusty | * |
Snort | Ubuntu | focal | * |
Snort | Ubuntu | trusty/esm | * |
Snort | Ubuntu | upstream | * |