Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Snort | Snort | 3.0.0 (including) | 3.1.57.0 (excluding) |
Snort | Ubuntu | bionic | * |
Snort | Ubuntu | lunar | * |
Snort | Ubuntu | trusty | * |
Snort | Ubuntu | xenial | * |