5.8

CVE-2021-1224

Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect detection of the HTTP payload if it is contained at least partially within the TFO connection handshake. An attacker could exploit this vulnerability by sending crafted TFO packets with an HTTP payload through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.

Data is provided by the National Vulnerability Database (NVD)
CiscoFirepower Threat Defense Version < 6.7.0
CiscoIos Xe Version < 17.4.1
   Cisco1100-4p Integrated Services Router Version-
   Cisco1100-8p Integrated Services Router Version-
   Cisco1101-4p Integrated Services Router Version-
   Cisco1109-2p Integrated Services Router Version-
   Cisco1109-4p Integrated Services Router Version-
   Cisco1111x-8p Integrated Services Router Version-
   Cisco4221 Integrated Services Router Version-
   Cisco4321 Integrated Services Router Version-
   Cisco4331 Integrated Services Router Version-
   Cisco4351 Integrated Services Router Version-
   Cisco4431 Integrated Services Router Version-
   Cisco4451-x Integrated Services Router Version-
   Cisco4461 Integrated Services Router Version-
   CiscoCsr 1000v Version-
   CiscoIsa 3000 Version-
SnortSnort Version < 2.9.17
CiscoMeraki Mx64 Firmware Version-
   CiscoMeraki Mx64 Version-
CiscoMeraki Mx64w Firmware Version-
   CiscoMeraki Mx64w Version-
CiscoMeraki Mx67 Firmware Version-
   CiscoMeraki Mx67 Version-
CiscoMeraki Mx67c Firmware Version-
   CiscoMeraki Mx67c Version-
CiscoMeraki Mx67w Firmware Version-
   CiscoMeraki Mx67w Version-
CiscoMeraki Mx68 Firmware Version-
   CiscoMeraki Mx68 Version-
CiscoMeraki Mx68cw Firmware Version-
   CiscoMeraki Mx68cw Version-
CiscoMeraki Mx68w Firmware Version-
   CiscoMeraki Mx68w Version-
CiscoMeraki Mx100 Firmware Version-
   CiscoMeraki Mx100 Version-
CiscoMeraki Mx84 Firmware Version-
   CiscoMeraki Mx84 Version-
CiscoMeraki Mx250 Firmware Version-
   CiscoMeraki Mx250 Version-
CiscoMeraki Mx450 Firmware Version-
   CiscoMeraki Mx450 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.37% 0.58
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:P/A:N
psirt@cisco.com 5.8 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
CWE-693 Protection Mechanism Failure

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.