5.8
CVE-2020-3299
- EPSS 0.57%
- Published 21.10.2020 19:15:15
- Last modified 21.11.2024 05:30:45
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Firepower Threat Defense Version >= 6.0.0 < 6.3.0.1
Cisco ≫ Cloud Services Router 1000v Version-
Cisco ≫ Isrv Version-
Cisco ≫ 1100-4p Version-
Cisco ≫ 1100-8p Version-
Cisco ≫ 1101-4p Version-
Cisco ≫ 1109-2p Version-
Cisco ≫ 1109-4p Version-
Cisco ≫ 1111x-8p Version-
Cisco ≫ 4221 Integrated Services Router Version-
Cisco ≫ 4331 Integrated Services Router Version-
Cisco ≫ 4431 Integrated Services Router Version-
Cisco ≫ 4461 Integrated Services Router Version-
Cisco ≫ Isa 3000 Version-
Cisco ≫ Meraki Mx Version-
Cisco ≫ Isrv Version-
Cisco ≫ 1100-4p Version-
Cisco ≫ 1100-8p Version-
Cisco ≫ 1101-4p Version-
Cisco ≫ 1109-2p Version-
Cisco ≫ 1109-4p Version-
Cisco ≫ 1111x-8p Version-
Cisco ≫ 4221 Integrated Services Router Version-
Cisco ≫ 4331 Integrated Services Router Version-
Cisco ≫ 4431 Integrated Services Router Version-
Cisco ≫ 4461 Integrated Services Router Version-
Cisco ≫ Isa 3000 Version-
Cisco ≫ Meraki Mx Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.57% | 0.678 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.8 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
psirt@cisco.com | 5.8 | 3.9 | 1.4 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
|
CWE-693 Protection Mechanism Failure
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.