First published: Wed Nov 01 2023(Updated: )
A vulnerability in the TLS 1.3 implementation of the Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to unexpectedly restart.This vulnerability is due to a logic error in how memory allocations are
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ftd-snort3-uAnUntcV is classified as high due to the potential impact on the system's availability.
To remediate cisco-sa-ftd-snort3-uAnUntcV, users should apply the latest software update from Cisco that addresses the vulnerability.
cisco-sa-ftd-snort3-uAnUntcV affects Cisco Firepower Threat Defense Software and Cisco Firepower Management Center.
Yes, cisco-sa-ftd-snort3-uAnUntcV can be exploited by an unauthenticated, remote attacker.
If cisco-sa-ftd-snort3-uAnUntcV is exploited, it may cause the Snort 3 detection engine to unexpectedly restart, affecting system performance.