First published: Wed Nov 01 2023(Updated: )
A vulnerability in the IP geolocation rules of Snort 3 could allow an unauthenticated, remote attacker to potentially bypass IP address restrictions. This vulnerability exists because the configuration for IP geolocation rules is not parsed properly. An attacker could exploit this vulnerability by spoofing an IP address until they bypass the restriction. A successful exploit could allow the attacker to bypass location-based IP address restrictions.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Threat Defense | >=6.7.0<=7.3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Snort 3 vulnerability is CVE-2023-20267.
The severity of CVE-2023-20267 is medium (5.3).
The Cisco Firepower Threat Defense software versions 6.7.0 to 7.3.1.1 are affected by CVE-2023-20267.
An attacker can exploit CVE-2023-20267 by bypassing IP address restrictions through the improper parsing of IP geolocation rules in Snort 3.
You can find more information about CVE-2023-20267 at the Cisco Security Advisory: [link](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdsnort3sip-bypass-LMz2ThKn).