Impact
This Vulnerability arises from incomplete error handling during RPC data parsing in the Snort 3 detection engine. When an attacker sends specially crafted RPC packets, the parser can crash, forcing the engine to restart. The resultant restart interrupts packet inspection, effectively denying service to all traffic monitored by the engine. The weakness is identified as CWE-248: Missing Proper Error Handling.
Affected Systems
Affected vendors include Cisco Cyber Vision, Cisco Secure Firewall Threat Defense (FTD) Software, and Cisco UTD SNORT IPS Engine Software. All impacted instances incorporate the Snort 3 detection engine; no specific version ranges are supplied in the advisory.
Risk and Exploitability
The advisory assigns a CVSS score of 5.8, indicating moderate severity, while the EPSS score is less than 1 % and the issue is not listed in the CISA KEV catalog. The vulnerability can be exploited remotely; an unauthenticated attacker must send crafted RPC packets to a susceptible instance. No escalation of privileges is required, and the primary effect is denial of service through an unexpected engine restart.
OpenCVE Enrichment