Description
Multiple Cisco products are affected by a vulnerability in the processing of DCE/RPC requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, resulting in an interruption of packet inspection.

This vulnerability is due to an error in buffer handling logic when processing DCE/RPC requests, which can result in a buffer use-after-free read. An attacker could exploit this vulnerability by sending a large number of DCE/RPC requests through an established connection that is inspected by Snort 3. A successful exploit could allow the attacker to unexpectedly restart the Snort 3 Detection Engine, which could cause a denial of service (DoS).
Published: 2026-01-07
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Assess Impact
AI Analysis

Impact

A buffer use‑after‑free flaw in the handling of DCE/RPC requests enables an unauthenticated remote attacker to read across memory boundaries, potentially leaking sensitive data. If the flaw is triggered repeatedly, it can force the Snort 3 Detection Engine to restart, resulting in a denial of service that disrupts packet inspection. The weakness is a classic buffer handling error (CWE‑415).

Affected Systems

The vulnerability affects Cisco Secure Firewall Threat Defense (FTD) Software and Cisco UTD SNORT IPS Engine Software running Snort 3. No specific version range is listed, so any deployment of these products that includes Snort 3 should be considered at risk until a patch is applied.

Risk and Exploitability

The CVSS score of 5.8 indicates a moderate severity, and the EPSS score of less than 1 % means the exploitation probability is low but not zero. The bug can be triggered by sending crafted DCE/RPC requests over a connection that is examined by Snort 3, implying a remote network attack vector. Although the vulnerability is not in the CISA KEV catalog, organizations should treat it with caution because it allows a remote attacker to recover sensitive data or bring down a critical network security service.

Generated by OpenCVE AI on April 18, 2026 at 19:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restart the Snort 3 Detection Engine when repeated restarts occur to restore packet inspection.
  • Configure network controls to block or restrict DCE/RPC traffic to the affected devices until a remediation is available.
  • Inspect logs for signs of abnormal DCE/RPC traffic or repeated Snort 3 engine restarts, and investigate any suspicious activity.

Generated by OpenCVE AI on April 18, 2026 at 19:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco secure Firewall Threat Defense
Cisco snort
Cisco utd Snort Ips Engine Software
Vendors & Products Cisco
Cisco secure Firewall Threat Defense
Cisco snort
Cisco utd Snort Ips Engine Software

Wed, 07 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
Description Multiple&nbsp;Cisco products are affected by a vulnerability in the processing of DCE/RPC requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, resulting in an interruption of packet inspection. This vulnerability is due to an error in buffer handling logic when processing DCE/RPC requests, which can result in a buffer use-after-free read. An attacker could exploit this vulnerability by sending a large number of DCE/RPC requests through an established connection that is inspected by Snort 3. A successful exploit could allow the attacker to unexpectedly restart the Snort 3 Detection Engine, which could cause a denial of service (DoS).
Title Multiple Cisco Products Snort 3 DCERPC Vulnerabilities
Weaknesses CWE-415
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L'}


Subscriptions

Cisco Secure Firewall Threat Defense Snort Utd Snort Ips Engine Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-02-12T18:48:34.084Z

Reserved: 2025-10-08T11:59:15.352Z

Link: CVE-2026-20026

cve-icon Vulnrichment

Updated: 2026-01-07T16:53:47.292Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T17:16:02.663

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-20026

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:00:09Z

Weaknesses