Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Nov 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2021-10-27T18:56:42.934548Z
Updated: 2024-11-07T21:45:31.681Z
Reserved: 2021-08-25T00:00:00
Link: CVE-2021-40116
Vulnrichment
Updated: 2024-08-04T02:27:31.552Z
NVD
Status : Modified
Published: 2021-10-27T19:15:08.717
Modified: 2023-11-07T03:38:28.713
Link: CVE-2021-40116
Redhat
No data.