A vulnerability in the Snort detection engine integration for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause unlimited memory consumption, which could lead to a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient memory management for certain Snort events. An attacker could exploit this vulnerability by sending a series of crafted IP packets that would generate specific Snort events on an affected device. A sustained attack could cause an out of memory condition on the affected device. A successful exploit could allow the attacker to interrupt all traffic flowing through the affected device. In some circumstances, the attacker may be able to cause the device to reload, resulting in a DoS condition.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Firepower 1000
Subscribe
Firepower 1010
Subscribe
Firepower 1020
Subscribe
Firepower 1030
Subscribe
Firepower 1040
Subscribe
Firepower 1120
Subscribe
Firepower 1140
Subscribe
Firepower 1150
Subscribe
Firepower 2100
Subscribe
Firepower 2110
Subscribe
Firepower 2120
Subscribe
Firepower 2130
Subscribe
Firepower 2140
Subscribe
Firepower 4100
Subscribe
Firepower 4110
Subscribe
Firepower 4112
Subscribe
Firepower 4115
Subscribe
Firepower 4120
Subscribe
Firepower 4125
Subscribe
Firepower 4140
Subscribe
Firepower 4145
Subscribe
Firepower 4150
Subscribe
Firepower Threat Defense
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-26001 | A vulnerability in the Snort detection engine integration for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause unlimited memory consumption, which could lead to a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient memory management for certain Snort events. An attacker could exploit this vulnerability by sending a series of crafted IP packets that would generate specific Snort events on an affected device. A sustained attack could cause an out of memory condition on the affected device. A successful exploit could allow the attacker to interrupt all traffic flowing through the affected device. In some circumstances, the attacker may be able to cause the device to reload, resulting in a DoS condition. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 06 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-06T16:20:47.088Z
Reserved: 2021-11-02T00:00:00
Link: CVE-2022-20751
Updated: 2024-08-03T02:24:49.350Z
Status : Modified
Published: 2022-05-03T04:15:09.700
Modified: 2024-11-21T06:43:28.677
Link: CVE-2022-20751
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD