### [CVE-2024-20342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20342) ![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Firepower%20Threat%20Defense%20Software&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=6.7.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.0.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.1.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.2.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.6.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.1.0.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.1.0.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.1.0.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.0.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.4.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.5.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.5.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.3.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.3.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.3.1.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.3.1.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.4.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.4.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.4.1.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Comparison%20Using%20Wrong%20Factors&color=brightgreen) ### Description Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter.  This vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds