6.5
CVE-2025-20359
- EPSS 0.28%
- Veröffentlicht 15.10.2025 16:17:31
- Zuletzt bearbeitet 16.10.2025 15:28:59
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Decoder that could allow an unauthenticated, remote attacker to cause the disclosure of possible sensitive data or cause the Snort 3 Detection Engine to crash. This vulnerability is due to an error in the logic of buffer handling when the MIME fields of the HTTP header are parsed. This can result in a buffer under-read. An attacker could exploit this vulnerability by sending crafted HTTP packets through an established connection that is parsed by Snort 3. A successful exploit could allow the attacker to induce one of two possible outcomes: the unexpected restarting of the Snort 3 Detection Engine, which could cause a denial of service (DoS) condition, or information disclosure of sensitive information in the Snort 3 data stream. Due to the under-read condition, it is possible that sensitive information that is not valid connection data could be returned.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
≫
Produkt
Cisco Cyber Vision
Default Statusunknown
Version
3.0.0
Status
affected
Version
3.0.2
Status
affected
Version
3.0.3
Status
affected
Version
3.0.1
Status
affected
Version
3.1.0
Status
affected
Version
3.0.4
Status
affected
Version
3.1.1
Status
affected
Version
3.1.2
Status
affected
Version
3.2.0
Status
affected
Version
3.0.5
Status
affected
Version
3.2.1
Status
affected
Version
3.0.6
Status
affected
Version
3.2.2
Status
affected
Version
3.2.3
Status
affected
Version
3.2.4
Status
affected
Version
4.0.0
Status
affected
Version
4.0.1
Status
affected
Version
4.0.2
Status
affected
Version
4.0.3
Status
affected
Version
4.1.0
Status
affected
Version
4.1.1
Status
affected
Version
4.1.2
Status
affected
Version
4.1.3
Status
affected
Version
4.1.4
Status
affected
Version
4.2.0
Status
affected
Version
4.2.1
Status
affected
Version
4.1.5
Status
affected
Version
4.2.2
Status
affected
Version
4.2.X
Status
affected
Version
4.2.3
Status
affected
Version
4.2.4
Status
affected
Version
4.2.6
Status
affected
Version
4.1.6
Status
affected
Version
4.3.0
Status
affected
Version
4.3.1
Status
affected
Version
4.3.2
Status
affected
Version
4.3.3
Status
affected
Version
4.4.0
Status
affected
Version
4.4.1
Status
affected
Version
4.4.2
Status
affected
Version
4.4.3
Status
affected
Version
4.1.7
Status
affected
Version
5.0.0
Status
affected
Version
5.0.1
Status
affected
Version
5.0.2
Status
affected
Version
5.1.0
Status
affected
Version
5.1.1
Status
affected
Version
5.1.2
Status
affected
Version
5.1.3
Status
affected
Version
5.2.0
Status
affected
Version
5.2.1
Status
affected
HerstellerCisco
≫
Produkt
Cisco Secure Firewall Threat Defense (FTD) Software
Default Statusunknown
Version
7.4.1
Status
affected
Version
7.4.1.1
Status
affected
Version
7.6.0
Status
affected
Version
7.4.2
Status
affected
Version
7.4.2.1
Status
affected
Version
7.7.0
Status
affected
Version
7.4.2.2
Status
affected
Version
7.6.1
Status
affected
Version
7.4.2.3
Status
affected
Version
7.4.2.4
Status
affected
HerstellerCisco
≫
Produkt
Cisco UTD SNORT IPS Engine Software
Default Statusunknown
Version
3.17.1S
Status
affected
Version
16.12.3
Status
affected
Version
16.12.4
Status
affected
Version
17.3.1a
Status
affected
Version
16.6.6
Status
affected
Version
16.12.2
Status
affected
Version
3.17.0S
Status
affected
Version
16.6.5
Status
affected
Version
17.2.1r
Status
affected
Version
17.1.1
Status
affected
Version
16.6.7a
Status
affected
Version
16.6.1
Status
affected
Version
16.12.1a
Status
affected
Version
17.3.2
Status
affected
Version
17.4.1a
Status
affected
Version
16.12.5
Status
affected
Version
17.5.1
Status
affected
Version
16.6.9
Status
affected
Version
17.3.3
Status
affected
Version
17.5.1a
Status
affected
Version
17.3.4
Status
affected
Version
17.3.4a
Status
affected
Version
17.4.2
Status
affected
Version
17.4.1b
Status
affected
Version
17.6.1a
Status
affected
Version
16.6.10
Status
affected
Version
17.7.1a
Status
affected
Version
16.12.6
Status
affected
Version
17.6.2
Status
affected
Version
17.8.1a
Status
affected
Version
16.12.7
Status
affected
Version
17.3.5
Status
affected
Version
17.6.3
Status
affected
Version
17.6.3a
Status
affected
Version
17.7.2
Status
affected
Version
17.9.1a
Status
affected
Version
17.6.4
Status
affected
Version
17.3.6
Status
affected
Version
16.12.8
Status
affected
Version
17.3.7
Status
affected
Version
17.9.2a
Status
affected
Version
17.6.5
Status
affected
Version
17.11.1a
Status
affected
Version
17.12.1a
Status
affected
Version
17.6.6
Status
affected
Version
17.3.8
Status
affected
Version
17.3.8a
Status
affected
Version
17.6.6a
Status
affected
Version
17.12.2
Status
affected
Version
17.12.3
Status
affected
Version
17.6.7
Status
affected
Version
17.12.3a
Status
affected
Version
17.12.4
Status
affected
Version
17.6.8
Status
affected
Version
17.6.8a
Status
affected
Version
17.12.4a
Status
affected
Version
17.15.2c
Status
affected
Version
17.12.4b
Status
affected
Version
17.15.2a
Status
affected
Version
17.12.5
Status
affected
Version
17.15.3a
Status
affected
Version
17.15.3
Status
affected
Version
17.12.5b
Status
affected
Version
17.15.4
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.28% | 0.508 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@cisco.com | 6.5 | 3.9 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
|
CWE-127 Buffer Under-read
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations prior to the targeted buffer.