First published: Wed Nov 09 2022(Updated: )
A vulnerability in the interaction of SIP and Snort 3 for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to restart. This vulnerability is due to a lack of error-checking when SIP bidirectional flows are being inspected by Snort 3. An attacker could exploit this vulnerability by sending a stream of crafted SIP traffic through an interface on the targeted device. A successful exploit could allow the attacker to trigger a restart of the Snort 3 process, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdsnort3sip-dos-A4cHeArC This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software | ||
Cisco Snort 3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-ftdsnort3sip-dos-A4cHeArC vulnerability is classified as a denial-of-service issue that can significantly impact affected systems.
To remediate the cisco-sa-ftdsnort3sip-dos-A4cHeArC vulnerability, update your Cisco Firepower Threat Defense and Snort 3 software to the latest version.
Cisco Firepower Threat Defense and Cisco Snort 3 users are affected by the cisco-sa-ftdsnort3sip-dos-A4cHeArC vulnerability.
The cisco-sa-ftdsnort3sip-dos-A4cHeArC vulnerability is caused by a lack of error-checking in the interaction between SIP and Snort 3.
Yes, the cisco-sa-ftdsnort3sip-dos-A4cHeArC vulnerability can be exploited by an unauthenticated, remote attacker.