First published: Wed Nov 01 2023(Updated: )
Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Snort Snort | >=3.0.0<3.1.57.0 | |
Cisco Firepower Threat Defense | >=7.0.0<=7.3.1.1 | |
Cisco IOS XE | >=17.12<17.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in Snort access control policies allows an unauthenticated, remote attacker to bypass the configured policies on an affected system.
Multiple Cisco products, including Snort and Cisco Unified Threat Defense, are affected by the vulnerability.
CVE-2023-20246 has a severity score of 5.8, which is considered medium severity.
The vulnerability in Snort access control policies occurs due to a logic error when the policies are being processed.
To fix the vulnerability, users should apply the necessary updates or patches provided by Cisco.