Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
26 Nov 2024, 16:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:firepower_management_center:2.9.17:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:2.9.16:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:2.9.14.0:*:*:*:*:*:*:* |
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:* |
First Time |
Cisco secure Firewall Management Center
|
21 Nov 2024, 06:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.8
v3 : 6.8 |
References | () https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html - | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU - Vendor Advisory | |
References | () https://www.debian.org/security/2023/dsa-5354 - |
19 Feb 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Oct 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-401 | |
CPE | cpe:2.3:a:cisco:firepower_management_center:2.9.17:*:*:*:*:*:*:* cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:2.9.14.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:2.9.16:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:2.9.15:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* |
|
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.8
v3 : 7.5 |
27 Oct 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload. |
27 Oct 2021, 19:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-27 19:15
Updated : 2024-11-26 16:09
NVD link : CVE-2021-40114
Mitre link : CVE-2021-40114
CVE.ORG link : CVE-2021-40114
JSON object : View
Products Affected
snort
- snort
cisco
- secure_firewall_management_center
- firepower_threat_defense
- unified_threat_defense