Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.
References
| Link | Resource |
|---|---|
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-01-13 22:15
Updated : 2021-01-19 18:35
NVD link : CVE-2021-1236
Mitre link : CVE-2021-1236
JSON object : View
Products Affected
snort
- snort
cisco
- firepower_management_center
- isr_1111x-8p
- isr_1101-4p
- isr_1109-2p
- isr_4331
- isr_1100-8p
- isr_4451-x
- isa_3000
- firepower_threat_defense
- isr_4351
- isr_1109-4p
- isr_4431
- ios_xe
- csr_1000v
- isr_4321
- isr_1100-4p
- isr_4461
- isr_4221
CWE
CWE-670
Always-Incorrect Control Flow Implementation
