First published: Wed Oct 23 2024(Updated: )
A vulnerability in the interaction between the TCP Intercept feature and the Snort 3 detection engine on Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies on an affected system. Devices that are configured with Snort 2 are not affected by this vulnerability. This vulnerability is due to a logic error when handling embryonic (half-open) TCP connections. An attacker could exploit this vulnerability by sending a crafted traffic pattern through an affected device. A successful exploit could allow unintended traffic to enter the network protected by the affected device.Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-bypass-PTry37fXThis advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center (FMC) and Firepower Threat Defense (FTD) Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-snort-bypass-PTry37fX is high, as it allows unauthenticated remote attackers to bypass security policies.
To fix cisco-sa-snort-bypass-PTry37fX, apply the latest software update provided by Cisco for Firepower Threat Defense Software.
Cisco Firepower Threat Defense Software is primarily affected by the vulnerability cisco-sa-snort-bypass-PTry37fX.
Yes, cisco-sa-snort-bypass-PTry37fX can be exploited by unauthenticated remote attackers.
The vulnerability cisco-sa-snort-bypass-PTry37fX involves the interaction between the TCP Intercept feature and the Snort 3 detection engine.