5.8
CVE-2024-20363
- EPSS 0.14%
- Published 22.05.2024 17:16:13
- Last modified 03.07.2025 17:19:51
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
Multiple Cisco products are affected by a vulnerability in the Snort Intrusion Prevention System (IPS) rule engine that could allow an unauthenticated, remote attacker to bypass the configured rules on an affected system. This vulnerability is due to incorrect HTTP packet handling. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured IPS rules and allow uninspected traffic onto the network.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Firepower Threat Defense Version7.4.0
Cisco ≫ Unified Threat Defense Snort Intrusion Prevention System Engine Version17.6.4
Cisco ≫ Unified Threat Defense Snort Intrusion Prevention System Engine Version17.6.5
Cisco ≫ Unified Threat Defense Snort Intrusion Prevention System Engine Version17.12.1a
Cisco ≫ Unified Threat Defense Snort Intrusion Prevention System Engine Version17.12.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.14% | 0.351 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
psirt@cisco.com | 5.8 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
|
CWE-290 Authentication Bypass by Spoofing
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.