First published: Thu Nov 10 2022(Updated: )
A vulnerability in the interaction of SIP and Snort 3 for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to restart. This vulnerability is due to a lack of error-checking when SIP bidirectional flows are being inspected by Snort 3. An attacker could exploit this vulnerability by sending a stream of crafted SIP traffic through an interface on the targeted device. A successful exploit could allow the attacker to trigger a restart of the Snort 3 process, resulting in a denial of service (DoS) condition.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | =7.2.0 | |
Cisco Firepower Threat Defense | =7.2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-20950.
Cisco Firepower Threat Defense (FTD) Software versions 7.2.0 and 7.2.0.1 are affected.
The severity of this vulnerability is medium with a CVSS score of 5.3.
An unauthenticated, remote attacker can exploit this vulnerability to cause the Snort 3 detection engine to restart.
Please refer to the Cisco Security Advisory for information on available fixes or patches.