Description
Multiple Cisco products are affected by a vulnerability in the processing of DCE/RPC requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, resulting in an interruption of packet inspection.

This vulnerability is due to an error in buffer handling logic when processing DCE/RPC requests, which can result in a buffer out-of-bounds read. An attacker could exploit this vulnerability by sending a large number of DCE/RPC requests through an established connection that is inspected by Snort 3. A successful exploit could allow the attacker to obtain sensitive information in the Snort 3 data stream.
Published: 2026-01-07
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive data leakage
Action: Immediate Patch
AI Analysis

Impact

The vulnerability results from flawed buffer handling logic when processing DCE/RPC requests within the Snort 3 Detection Engine. A malicious actor can send specially crafted or a large volume of DCE/RPC frames, triggering an out‑of‑bounds read that allows the engine to expose sensitive data from the packet inspection stream or to crash, leading to a disruption of packet inspection services. This leads to partial information disclosure and a potential denial of service, as outlined by CWE‑200.

Affected Systems

Cisco Secure Firewall Threat Defense (FTD) Software and Cisco UTD SNORT IPS Engine Software are the products impacted by this error. No specific version range is disclosed in the advisory, so any installation of the affected components without a patch should be considered at risk.

Risk and Exploitability

It is rated medium level severity with a CVSS score of 5.3 and an EPSS score of less than 1 %, indicating a low likelihood of exploitation in the wild. The advisory confirms that the attack can be performed remotely by an unauthenticated attacker, without the need for privileged access or special credentials. The vulnerability is not listed in the CISA KEV catalog, which further reflects its lower systemic threat posture.

Generated by OpenCVE AI on April 18, 2026 at 08:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco Secure Firewall or SNORT IPS Engine firmware update that contains the buffer‑handling fix.
  • If an update is unavailable, block or restrict DCE/RPC traffic through firewall or policy rules until the issue is addressed.
  • Configure session limits or throttle DCE/RPC request rates to reduce the chance of overflow or crash until a patch is applied.

Generated by OpenCVE AI on April 18, 2026 at 08:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco secure Firewall Threat Defense
Cisco snort
Cisco utd Snort Ips Engine Software
Vendors & Products Cisco
Cisco secure Firewall Threat Defense
Cisco snort
Cisco utd Snort Ips Engine Software

Wed, 07 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
Description Multiple Cisco products are affected by a vulnerability in the processing of DCE/RPC requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, resulting in an interruption of packet inspection. This vulnerability is due to an error in buffer handling logic when processing DCE/RPC requests, which can result in a buffer out-of-bounds read. An attacker could exploit this vulnerability by sending a large number of DCE/RPC requests through an established connection that is inspected by Snort 3. A successful exploit could allow the attacker to obtain sensitive information in the Snort 3 data stream.
Title Cisco Snort DCERPC Stub Data Out of Bounds Read
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Cisco Secure Firewall Threat Defense Snort Utd Snort Ips Engine Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-02-12T18:48:32.446Z

Reserved: 2025-10-08T11:59:15.352Z

Link: CVE-2026-20027

cve-icon Vulnrichment

Updated: 2026-01-07T16:51:31.624Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T17:16:02.877

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-20027

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:15:15Z

Weaknesses