Description
Multiple Cisco products are affected by vulnerabilities in the Snort 3 VBA feature that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to crash.

These vulnerabilities are due to improper error checking when decompressing VBA data. An attacker could exploit these vulnerabilities by sending crafted VBA data to the Snort 3 Detection Engine on the targeted device. A successful exploit could allow the attacker to cause the Snort 3 Detection Engine to unexpectedly restart, causing a DoS condition.
Published: 2026-03-04
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability stems from improper error handling when decompressing VBA data in Snort 3. An attacker can send specially crafted VBA data to the Snort 3 Detection Engine, which will process the data without adequate bounds checking, leading to a crash. The crash causes the Snort 3 engine to restart, resulting in a denial‑of‑service to the firewall’s intrusion detection capabilities. The flaw is classified as CWE‑786 and allows only a denial of service, with no privilege escalation.

Affected Systems

Cisco Secure Firewall Threat Defense Software (FTD) and Cisco UTD SNORT IPS Engine Software are vulnerable. No specific firmware or software version ranges are listed in the advisory; administrators should check for updates on affected deployments.

Risk and Exploitability

The CVSS score of 5.8 indicates moderate severity. EPSS shows a likelihood of exploitation of less than 1 %, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an unauthenticated remote attacker can exploit it by sending a crafted VBA payload over a network path that reaches the Snort 3 engine, typically through the firewall’s management or data plane. Successful exploitation results in a restart of the detection engine, interrupting packet inspection for the affected device. The condition does not require authenticated access or privileged execution, but requires the ability to reach the Snort 3 service.

Generated by OpenCVE AI on April 17, 2026 at 13:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply Cisco’s latest firmware or software patch that addresses the Snort 3 VBA decompression flaw as detailed in the Cisco advisory.
  • If a patch is not yet available, restrict traffic that may contain VBA payloads to the Snort 3 interface or disable the VBA feature through the device configuration, then isolate the service with ACLs.
  • Monitor system logs for repeated Snort 3 engine restarts and verify the appliance’s health; report anomalies to Cisco support.

Generated by OpenCVE AI on April 17, 2026 at 13:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco cisco Utd Snort Ips Engine Software
Cisco secure Firewall Threat Defense
Vendors & Products Cisco
Cisco cisco Utd Snort Ips Engine Software
Cisco secure Firewall Threat Defense

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description Multiple Cisco products are affected by vulnerabilities in the Snort 3 VBA feature that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to crash. These vulnerabilities are due to improper error checking when decompressing VBA data. An attacker could exploit these vulnerabilities by sending crafted VBA data to the Snort 3 Detection Engine on the targeted device. A successful exploit could allow the attacker to cause the Snort 3 Detection Engine to unexpectedly restart, causing a DoS condition.
Title Cisco Secure Firewall Threat Defense Software Snort 3 Visual Basic for Application Denial of Service Vulnerability
Weaknesses CWE-786
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L'}


Subscriptions

Cisco Cisco Utd Snort Ips Engine Software Secure Firewall Threat Defense
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-04T21:01:36.320Z

Reserved: 2025-10-08T11:59:15.356Z

Link: CVE-2026-20058

cve-icon Vulnrichment

Updated: 2026-03-04T21:01:31.281Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-04T18:16:20.643

Modified: 2026-03-05T19:39:11.967

Link: CVE-2026-20058

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:15:19Z

Weaknesses