First published: Wed Jan 13 2021(Updated: )
Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Snort |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-snort-app-bypass-cSBYCATq vulnerability is classified as critical due to its ability to allow unauthorized access.
To mitigate the cisco-sa-snort-app-bypass-cSBYCATq vulnerability, update your Cisco Snort version to the latest available release.
The cisco-sa-snort-app-bypass-cSBYCATq vulnerability affects multiple Cisco products utilizing the Snort application detection engine.
The cisco-sa-snort-app-bypass-cSBYCATq vulnerability allows an unauthenticated attacker to bypass security policies, compromising system integrity.
No specific workaround is provided for the cisco-sa-snort-app-bypass-cSBYCATq vulnerability, so applying the recommended updates is essential.