First published: Wed Oct 23 2024(Updated: )
A vulnerability in the TCP/IP traffic handling function of the Snort Detection Engine of Cisco Firepower Threat Defense (FTD) Software and Cisco FirePOWER Services could allow an unauthenticated, remote attacker to cause legitimate network traffic to be dropped, resulting in a denial of service (DoS) condition.This vulnerability is due to the improper handling of TCP/IP network traffic. An attacker could exploit this vulnerability by sending a large amount of TCP/IP network traffic through the affected device. A successful exploit could allow the attacker to cause the Cisco FTD device to drop network traffic, resulting in a DoS condition. The affected device must be rebooted to resolve the DoS condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-ftd-snort-fw-BCJTZPMuThis advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software | ||
Cisco ASA FirePOWER |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-sa-ftd-snort-fw-BCJTZPMu is critical due to its potential impact on network availability.
To fix cisco-sa-sa-ftd-snort-fw-BCJTZPMu, update Cisco Firepower Threat Defense Software and Cisco FirePOWER Services to the latest version that addresses this vulnerability.
cisco-sa-sa-ftd-snort-fw-BCJTZPMu allows an unauthenticated remote attacker to drop legitimate network traffic, resulting in a denial of service.
cisco-sa-sa-ftd-snort-fw-BCJTZPMu affects Cisco Firepower Threat Defense Software and Cisco FirePOWER Services.
No, user authentication is not required to exploit cisco-sa-sa-ftd-snort-fw-BCJTZPMu, making it particularly dangerous.