Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-20363", "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "state": "PUBLISHED", "assignerShortName": "cisco", "dateReserved": "2023-11-08T15:08:07.651Z", "datePublished": "2024-05-22T16:52:53.274Z", "dateUpdated": "2024-08-01T21:59:42.321Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco", "dateUpdated": "2024-05-22T16:52:53.274Z"}, "descriptions": [{"lang": "en", "value": "Multiple Cisco products are affected by a vulnerability in the Snort Intrusion Prevention System (IPS) rule engine that could allow an unauthenticated, remote attacker to bypass the configured rules on an affected system. This vulnerability is due to incorrect HTTP packet handling. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured IPS rules and allow uninspected traffic onto the network."}], "affected": [{"vendor": "Cisco", "product": "Cisco Firepower Threat Defense Software", "versions": [{"version": "7.4.0", "status": "affected"}]}, {"vendor": "Cisco", "product": "Cisco UTD SNORT IPS Engine Software", "versions": [{"version": "17.6.4", "status": "affected"}, {"version": "17.6.5", "status": "affected"}, {"version": "17.12.1a", "status": "affected"}, {"version": "17.12.2", "status": "affected"}]}], "problemTypes": [{"descriptions": [{"lang": "en", "description": "Authentication Bypass by Spoofing", "type": "cwe", "cweId": "CWE-290"}]}], "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-ips-bypass-uE69KBMd", "name": "cisco-sa-snort3-ips-bypass-uE69KBMd"}], "metrics": [{"format": "cvssV3_1", "cvssV3_1": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "baseScore": 5.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}}], "exploits": [{"lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}], "source": {"advisory": "cisco-sa-snort3-ips-bypass-uE69KBMd", "discovery": "INTERNAL", "defects": ["CSCwh22565", "CSCwh73244"]}}, "adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2024-20363", "role": "CISA Coordinator", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "version": "2.0.3", "timestamp": "2024-05-22T17:52:45.758246Z"}}}], "affected": [{"cpes": ["cpe:2.3:a:cisco:firepower_threat_defense:7.4.0:*:*:*:*:*:*:*"], "vendor": "cisco", "product": "firepower_threat_defense", "versions": [{"status": "affected", "version": "7.4.0"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:cisco:snort_intrusion_prevention_system:17.6.4:*:*:*:*:*:*:*"], "vendor": "cisco", "product": "snort_intrusion_prevention_system", "versions": [{"status": "affected", "version": "17.6.4"}], "defaultStatus": "affected"}, {"cpes": ["cpe:2.3:a:cisco:snort_intrusion_prevention_system:17.6.5:*:*:*:*:*:*:*"], "vendor": "cisco", "product": "snort_intrusion_prevention_system", "versions": [{"status": "affected", "version": "17.6.5"}], "defaultStatus": "affected"}, {"cpes": ["cpe:2.3:a:cisco:snort_intrusion_prevention_system:17.12.1a:*:*:*:*:*:*:*"], "vendor": "cisco", "product": "snort_intrusion_prevention_system", "versions": [{"status": "affected", "version": "17.12.1a"}], "defaultStatus": "affected"}, {"cpes": ["cpe:2.3:a:cisco:snort_intrusion_prevention_system:17.12.2:*:*:*:*:*:*:*"], "vendor": "cisco", "product": "snort_intrusion_prevention_system", "versions": [{"status": "affected", "version": "17.12.2"}], "defaultStatus": "affected"}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "CWE", "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing"}]}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T17:40:03.436Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T21:59:42.321Z"}, "title": "CVE Program Container", "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-ips-bypass-uE69KBMd", "name": "cisco-sa-snort3-ips-bypass-uE69KBMd", "tags": ["x_transferred"]}]}]}}