Published on: Not Yet Published
Last Modified on: 11/22/2022 02:50:00 PM UTC
CVE-2022-20950 - advisory for cisco-sa-ftdsnort3sip-dos-A4cHeArCSource: Mitre Source: NIST CVE.ORG Print: PDF
A vulnerability in the interaction of SIP and Snort 3 for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to restart. This vulnerability is due to a lack of error-checking when SIP bidirectional flows are being inspected by Snort 3. An attacker could exploit this vulnerability by sending a stream of crafted SIP traffic through an interface on the targeted device. A successful exploit could allow the attacker to trigger a restart of the Snort 3 process, resulting in a denial of service (DoS) condition.
- CVE-2022-20950 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.
- The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
- Affected Vendor/Software: Cisco - Cisco Firepower Threat Defense Software version = 7.2.0
- Affected Vendor/Software: Cisco - Cisco Firepower Threat Defense Software version = 188.8.131.52
CVSS3 Score: 5.3 - MEDIUM
|No Description Provided|| tools.cisco.com |
Known Affected Configurations (CPE V2.3)
|Application||Cisco||Firepower Threat Defense||7.2.0||All||All||All|
|Application||Cisco||Firepower Threat Defense||184.108.40.206||All||All||All|