Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and deliver a malicious payload.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ftd-zXYtnjOM | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
25 Jan 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-01 18:15
Updated : 2024-02-05 00:01
NVD link : CVE-2023-20071
Mitre link : CVE-2023-20071
CVE.ORG link : CVE-2023-20071
JSON object : View
Products Affected
snort
- snort
cisco
- meraki_mx_security_appliance_firmware
- unified_threat_defense
- cyber_vision
- firepower_threat_defense
CWE
NVD-CWE-noinfo
CWE-1039
Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations