CVE-2024-20363

Multiple Cisco products are affected by a vulnerability in the Snort Intrusion Prevention System (IPS) rule engine that could allow an unauthenticated, remote attacker to bypass the configured rules on an affected system. This vulnerability is due to incorrect HTTP packet handling. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured IPS rules and allow uninspected traffic onto the network.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
ciscoCNA
5.8 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 50%
VendorProductVersion
ciscofirepower_threat_defense
7.4.0
ciscounified_threat_defense_snort_intrusion_prevention_system_engine
17.6.4
ciscounified_threat_defense_snort_intrusion_prevention_system_engine
17.6.5
ciscounified_threat_defense_snort_intrusion_prevention_system_engine
17.12.1a:a
ciscounified_threat_defense_snort_intrusion_prevention_system_engine
17.12.2
ciscosnort
3.0.0-233 ≤
𝑥
< 3.1.69.0
𝑥
= Vulnerable software versions