CVE-2022-20943

Summary

CVECVE-2022-20943
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-11-15 21:15:00 UTC
Updated2024-01-25 17:15:00 UTC
DescriptionMultiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition. Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details ["#details"] section of this advisory for more information. Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected.

Risk And Classification

Problem Types: NVD-CWE-Other

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Cisco Cyber Vision 3.0.0 All All All
Application Cisco Cyber Vision 3.0.1 All All All
Application Cisco Cyber Vision 3.0.2 All All All
Application Cisco Cyber Vision 3.0.3 All All All
Application Cisco Cyber Vision 3.0.5 All All All
Application Cisco Cyber Vision 3.0.6 All All All
Application Cisco Cyber Vision 3.1.0 All All All
Application Cisco Cyber Vision 3.1.1 All All All
Application Cisco Cyber Vision 3.1.2 All All All
Application Cisco Cyber Vision 3.2.0 All All All
Application Cisco Cyber Vision 3.2.1 All All All
Application Cisco Cyber Vision 3.2.2 All All All
Application Cisco Cyber Vision 3.2.3 All All All
Application Cisco Cyber Vision 3.2.4 All All All
Application Cisco Cyber Vision 4.0.0 All All All
Application Cisco Cyber Vision 4.0.1 All All All
Application Cisco Cyber Vision 4.0.2 All All All
Application Cisco Cyber Vision 4.0.3 All All All
Application Cisco Cyber Vision 4.1.0 All All All
Application Cisco Cyber Vision 4.1.1 All All All
Application Cisco Firepower Threat Defense 7.0.0 All All All
Application Cisco Firepower Threat Defense 7.0.0.1 All All All
Application Cisco Firepower Threat Defense 7.0.1 All All All
Application Cisco Firepower Threat Defense 7.0.1.1 All All All
Operating System Cisco Meraki Mx Security Appliance Firmware All All All All

References

ReferenceSourceLinkTags
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-... MISC tools.cisco.com
Multiple Cisco Products Snort SMB2 Detection Engine Policy Bypass and Denial of Service Vulnerabilities sec.cloudapps.cisco.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report