First published: Thu Apr 29 2021(Updated: )
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of specific HTTP header parameters. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured file policy for HTTP packets and deliver a malicious payload.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | <6.4.0.12 | |
Cisco Firepower Threat Defense | >=6.5.0<6.6.4 | |
Cisco Firepower Threat Defense | >=6.7.0<6.7.0.2 | |
Cisco IOS XE | >=16.12<16.12.5 | |
Snort Snort | <2.9.17.1 | |
Cisco IOS XE | >=17.1<17.3.3 | |
Cisco IOS XE | >=17.4<17.4.1 | |
Cisco 1100-4g\/6g Integrated Services Router | ||
Cisco 1101 Integrated Services Router | ||
Cisco 1109 Integrated Services Router | ||
Cisco 1111x Integrated Services Router | ||
Cisco 111x Integrated Services Router | ||
Cisco 1120 Integrated Services Router | ||
Cisco 1160 Integrated Services Router | ||
Cisco 3000 Integrated Services Router | ||
Cisco 4221 Integrated Services Router | ||
Cisco 4331 Integrated Services Router | ||
Cisco 4431 Integrated Services Router | ||
Cisco 4461 Integrated Services Router | ||
Cisco C8200-1n-4t | ||
Cisco C8200l-1n-4t | ||
Cisco Catalyst 8300-1n1s-4t2x | ||
Cisco Catalyst 8300-1n1s-6t | ||
Cisco Catalyst 8300-2n2s-4t2x | ||
Cisco Catalyst 8300-2n2s-6t | ||
Cisco Catalyst 8500l | ||
debian/snort | <=2.9.7.0-5<=2.9.15.1-5<=2.9.15.1-6 | 2.9.20-0+deb10u1 2.9.20-0+deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-1495.
Multiple Cisco products are affected, including Cisco Firepower Threat Defense and Cisco IOS XE.
The severity of CVE-2021-1495 is medium with a CVSS score of 5.3.
An attacker can exploit CVE-2021-1495 by bypassing a configured file policy for HTTP.
The recommended solution for CVE-2021-1495 is to update to the latest version of the affected software.