First published: Wed Nov 01 2023(Updated: )
A vulnerability in the IP geolocation rules of Snort 3 could allow an unauthenticated, remote attacker to potentially bypass IP address restrictions.This vulnerability exists because the configuration for IP geolocation rules is not parsed properly. An attacker could exploit this
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software | ||
Cisco Snort 3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-ftdsnort3sip-bypass-LMz2ThKn has been rated as high severity due to its potential to allow unauthorized access.
To mitigate cisco-sa-ftdsnort3sip-bypass-LMz2ThKn, update your Cisco Firepower Threat Defense and Snort 3 software to the latest versions that contain the security fix.
Cisco Firepower Threat Defense Software and Cisco Snort 3 users are affected by the vulnerability cisco-sa-ftdsnort3sip-bypass-LMz2ThKn.
The vulnerability cisco-sa-ftdsnort3sip-bypass-LMz2ThKn can be exploited to bypass IP address restrictions, potentially leading to unauthorized access.
No, authentication is not required to exploit the vulnerability cisco-sa-ftdsnort3sip-bypass-LMz2ThKn, making it particularly dangerous.