Impact
A flaw in the Snort 3 Detection Engine’s binder module initialization logic can cause the engine to restart when certain packets are parsed over an established connection. This restart leads to an interruption of packet inspection, effectively denying the service. The vulnerability is categorized as a denial‑of‑service (DoS) and is identified as CWE‑667. The impact is limited to availability, as it does not directly compromise confidentiality or integrity.
Affected Systems
Cisco Secure Firewall Threat Defense (FTD) Software and Cisco UTD SNORT IPS Engine Software are affected. No specific version ranges are listed, implying all current releases of these products are vulnerable until the fix is applied.
Risk and Exploitability
The CVSS score of 5.8 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not included in CISA’s KEV catalog. The attack appears to be possible remotely via normal network traffic, with an unauthenticated attacker needing only to send crafted packets through an existing connection to trigger the DoS.
OpenCVE Enrichment