This vulnerability is due to a logic error when handling embryonic (half-open) TCP connections. An attacker could exploit this vulnerability by sending a crafted traffic pattern through an affected device. A successful exploit could allow unintended traffic to enter the network protected by the affected device.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-18122 | A vulnerability in the interaction between the TCP Intercept feature and the Snort 3 detection engine on Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies on an affected system. Devices that are configured with Snort 2 are not affected by this vulnerability. This vulnerability is due to a logic error when handling embryonic (half-open) TCP connections. An attacker could exploit this vulnerability by sending a crafted traffic pattern through an affected device. A successful exploit could allow unintended traffic to enter the network protected by the affected device. |
Tue, 05 Aug 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco firepower Threat Defense
|
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.10:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.11:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.12:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.13:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.14:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.15:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.16:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.17:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.18:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.9:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.13:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.15:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.16:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.17:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.18:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.7.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.7.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.6.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.6.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.4.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.5.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.5.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.8.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.2.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.3.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.3.1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.4.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.4.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Cisco firepower Threat Defense
|
Thu, 24 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco firepower Threat Defense Software |
|
| CPEs | cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cisco
Cisco firepower Threat Defense Software |
|
| Metrics |
ssvc
|
Wed, 23 Oct 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the interaction between the TCP Intercept feature and the Snort 3 detection engine on Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies on an affected system. Devices that are configured with Snort 2 are not affected by this vulnerability. This vulnerability is due to a logic error when handling embryonic (half-open) TCP connections. An attacker could exploit this vulnerability by sending a crafted traffic pattern through an affected device. A successful exploit could allow unintended traffic to enter the network protected by the affected device. | |
| Weaknesses | CWE-399 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-10-24T16:09:41.083Z
Reserved: 2023-11-08T15:08:07.661Z
Link: CVE-2024-20407
Updated: 2024-10-24T16:09:05.099Z
Status : Analyzed
Published: 2024-10-23T18:15:08.413
Modified: 2025-08-05T14:53:15.063
Link: CVE-2024-20407
No data.
OpenCVE Enrichment
No data.
EUVD