CVE-2021-40116
27.10.2021, 19:15
Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | firepower_threat_defense | 6.4.0 ≤ 𝑥 < 6.4.0.13 |
cisco | firepower_threat_defense | 6.6.0 ≤ 𝑥 < 6.6.5.1 |
cisco | firepower_threat_defense | 6.7.0 ≤ 𝑥 < 6.7.0.3 |
cisco | firepower_threat_defense | 7.0.0 ≤ 𝑥 < 7.0.1 |
cisco | secure_firewall_management_center | 3.1.0.1 |
snort | snort | 3.0.0.0 ≤ 𝑥 < 3.1.0.100 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration