First published: Wed Nov 01 2023(Updated: )
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system.This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An
Affected Software | Affected Version | How to fix |
---|---|---|
Snort |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-snort-ftd-zXYtnjOM is classified as high due to the potential for unauthenticated remote access by attackers.
To fix cisco-sa-snort-ftd-zXYtnjOM, update the Snort detection engine to the latest version provided by Cisco.
Cisco Snort is the primary product affected by the vulnerability identified in cisco-sa-snort-ftd-zXYtnjOM.
cisco-sa-snort-ftd-zXYtnjOM may allow attackers to bypass configured security policies, increasing the risk of unauthorized access.
No, the cisco-sa-snort-ftd-zXYtnjOM vulnerability can be exploited by unauthenticated, remote attackers.