Vulnerability in the Snort Detection Engine for Cisco Products
CVE-2022-20943
Summary
Multiple security vulnerabilities exist within the Snort detection engine of various Cisco products, specifically when handling Server Message Block Version 2 (SMB2) traffic. These vulnerabilities stem from the ineffective management of system resources, allowing unauthenticated attackers to exploit the processing of SMB2 packets. A successful exploitation could lead to a denial of service (DoS), as the Snort process may reload under certain conditions. Furthermore, if the 'preserve-connection' option is enabled—which is the default setting—attackers may bypass configured security policies and inject malicious payloads into the protected network. Note that this affects products only when configured with Snort 3; those using Snort 2 remain unaffected. For further details, refer to Cisco's advisory.
Affected Version(s)
Cisco Cyber Vision 3.0.4
Cisco Cyber Vision 3.0.0
Cisco Cyber Vision 3.0.1
References
CVSS V3.1
Timeline
- đź‘ľ
Exploit known to exist
Vulnerability published
Vulnerability Reserved