Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
26 Nov 2024, 16:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:secure_firewall_management_center:3.1.0.1:*:*:*:*:*:*:* | |
First Time |
Cisco secure Firewall Management Center
|
21 Nov 2024, 06:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.1
v3 : 8.6 |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-RywH7ezM - Vendor Advisory |
29 Oct 2021, 13:26
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-RywH7ezM - Vendor Advisory | |
CPE | cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_management_center:3.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 7.1
v3 : 7.5 |
27 Oct 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable. |
27 Oct 2021, 19:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-27 19:15
Updated : 2024-11-26 16:09
NVD link : CVE-2021-40116
Mitre link : CVE-2021-40116
CVE.ORG link : CVE-2021-40116
JSON object : View
Products Affected
snort
- snort
cisco
- secure_firewall_management_center
- firepower_threat_defense
CWE