A vulnerability in the SSL file policy implementation of Cisco Firepower Threat Defense (FTD) Software that occurs when the SSL/TLS connection is configured with a URL Category and the Snort 3 detection engine could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to unexpectedly restart. This vulnerability exists because a logic error occurs when a Snort 3 detection engine inspects an SSL/TLS connection that has either a URL Category configured on the SSL file policy or a URL Category configured on an access control policy with TLS server identity discovery enabled. Under specific, time-based constraints, an attacker could exploit this vulnerability by sending a crafted SSL/TLS connection through an affected device. A successful exploit could allow the attacker to trigger an unexpected reload of the Snort 3 detection engine, resulting in either a bypass or denial of service (DoS) condition, depending on device configuration. The Snort 3 detection engine will restart automatically. No manual intervention is required.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2023-11-01T16:41:37.495Z

Updated: 2024-08-02T09:05:35.348Z

Reserved: 2022-10-27T18:47:50.363Z

Link: CVE-2023-20177

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-01T17:15:11.287

Modified: 2024-11-21T07:40:45.160

Link: CVE-2023-20177

cve-icon Redhat

No data.