A vulnerability in the interaction of SIP and Snort 3 for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to restart. This vulnerability is due to a lack of error-checking when SIP bidirectional flows are being inspected by Snort 3. An attacker could exploit this vulnerability by sending a stream of crafted SIP traffic through an interface on the targeted device. A successful exploit could allow the attacker to trigger a restart of the Snort 3 process, resulting in a denial of service (DoS) condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdsnort3sip-dos-A4cHeArC | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-11-15 13:15
Updated : 2022-11-22 06:50
NVD link : CVE-2022-20950
Mitre link : CVE-2022-20950
JSON object : View
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions
Products Affected
cisco
- firepower_threat_defense