First published: Wed May 22 2024(Updated: )
Multiple Cisco products are affected by a vulnerability in the Snort Intrusion Prevention System (IPS) rule engine that could allow an unauthenticated, remote attacker to bypass the configured rules on an affected system. This vulnerability is due to incorrect HTTP packet
Affected Software | Affected Version | How to fix |
---|---|---|
Snort |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-snort3-ips-bypass-uE69KBMd is rated as high due to the potential for an unauthenticated remote attacker to bypass security measures.
To fix cisco-sa-snort3-ips-bypass-uE69KBMd, it is recommended to apply the latest patches and updates provided by Cisco for the Snort Intrusion Prevention System.
The vulnerability cisco-sa-snort3-ips-bypass-uE69KBMd affects multiple Cisco products that utilize the Snort Intrusion Prevention System.
An attacker exploiting cisco-sa-snort3-ips-bypass-uE69KBMd could bypass configured IPS rules, potentially compromising system security.
Yes, cisco-sa-snort3-ips-bypass-uE69KBMd is remotely exploitable as it allows unauthenticated attackers to bypass IPS rules.