CVE-2024-20342
23.10.2024, 17:15
Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter. This vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | snort | 3.0.0.0 ≤ 𝑥 < 3.1.74.0 |
cisco | firepower_threat_defense_software | 𝑥 < 7.0.6.2 |
cisco | firepower_threat_defense_software | 7.2.0 ≤ 𝑥 < 7.2.6 |
cisco | firepower_threat_defense_software | 7.4.0 ≤ 𝑥 < 7.4.2 |
cisco | firepower_threat_defense_software | 7.1.0 |
cisco | firepower_threat_defense_software | 7.3.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration