Impact
The affected Snort 3 Detection Engine contains a flaw in JSTokenizer normalization during HTTP inspection of JavaScript. An attacker can send crafted HTTP packets over an existing connection to trigger a crash, causing the engine to restart unexpectedly. The outcome is a denial of service, temporarily disabling packet inspection and potentially leading to loss of security coverage.
Affected Systems
The flaw impacts Cisco Secure Firewall Threat Defense (FTD) Software and Cisco UTD SNORT IPS Engine Software. Specific product versions are not disclosed in the advisory.
Risk and Exploitability
The CVSS score is 5.8, indicating a moderate risk. The EPSS score is less than 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting a low exploitation probability in the wild. The vulnerability is reachable by an unauthenticated remote attacker who can send specially crafted HTTP packets over an established connection, as the flaw arises during HTTP inspection of JavaScript. The effective attack vector is remote network traffic, and the attacker needs only to craft the payload; no privileged access is required.
OpenCVE Enrichment