Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and deliver a malicious payload.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ftd-zXYtnjOM | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
09 Nov 2023, 18:30
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco cyber Vision
Cisco unified Threat Defense Snort Cisco firepower Threat Defense Snort snort Cisco meraki Mx Security Appliance Firmware Cisco |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.8 |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:*:*:*:*:*:*:*:* cpe:2.3:a:snort:snort:2.0:-:*:*:*:*:*:* |
|
References | (MISC) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ftd-zXYtnjOM - Vendor Advisory |
01 Nov 2023, 18:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-01 18:15
Updated : 2024-01-25 17:15
NVD link : CVE-2023-20071
Mitre link : CVE-2023-20071
JSON object : View
Products Affected
cisco
- firepower_threat_defense
- meraki_mx_security_appliance_firmware
- cyber_vision
- unified_threat_defense
snort
- snort
CWE