Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Nov 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco secure Firewall Management Center
|
|
CPEs | cpe:2.3:a:cisco:secure_firewall_management_center:3.1.0.1:*:*:*:*:*:*:* | |
Vendors & Products |
Cisco firepower Management Center
|
Cisco secure Firewall Management Center
|
Thu, 07 Nov 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2021-10-27T18:56:42.934548Z
Updated: 2024-11-07T21:45:31.681Z
Reserved: 2021-08-25T00:00:00
Link: CVE-2021-40116
Vulnrichment
Updated: 2024-08-04T02:27:31.552Z
NVD
Status : Modified
Published: 2021-10-27T19:15:08.717
Modified: 2024-11-26T16:09:02.407
Link: CVE-2021-40116
Redhat
No data.