Impact
A buffer use‑after‑free flaw in the handling of DCE/RPC requests enables an unauthenticated remote attacker to read across memory boundaries, potentially leaking sensitive data. If the flaw is triggered repeatedly, it can force the Snort 3 Detection Engine to restart, resulting in a denial of service that disrupts packet inspection. The weakness is a classic buffer handling error (CWE‑415).
Affected Systems
The vulnerability affects Cisco Secure Firewall Threat Defense (FTD) Software and Cisco UTD SNORT IPS Engine Software running Snort 3. No specific version range is listed, so any deployment of these products that includes Snort 3 should be considered at risk until a patch is applied.
Risk and Exploitability
The CVSS score of 5.8 indicates a moderate severity, and the EPSS score of less than 1 % means the exploitation probability is low but not zero. The bug can be triggered by sending crafted DCE/RPC requests over a connection that is examined by Snort 3, implying a remote network attack vector. Although the vulnerability is not in the CISA KEV catalog, organizations should treat it with caution because it allows a remote attacker to recover sensitive data or bring down a critical network security service.
OpenCVE Enrichment