mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
155 lines
7.2 KiB
JSON
155 lines
7.2 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-20508",
|
|
"ASSIGNER": "psirt@cisco.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability in Cisco Unified Threat Defense (UTD) Snort Intrusion Prevention System (IPS) Engine for Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured security policies or cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of HTTP requests when they are processed by Cisco UTD Snort IPS Engine. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process. If the action in case of Cisco UTD Snort IPS Engine failure is set to the default, fail-open, successful exploitation of this vulnerability could allow the attacker to bypass configured security policies. If the action in case of Cisco UTD Snort IPS Engine failure is set to fail-close, successful exploitation of this vulnerability could cause traffic that is configured to be inspected by Cisco UTD Snort IPS Engine to be dropped."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Heap-based Buffer Overflow",
|
|
"cweId": "CWE-122"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Cisco",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Cisco UTD SNORT IPS Engine Software",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.12.1a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.12.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.13.1a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.12.3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.12.3a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.15.1a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.9.5a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.6.1a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.8.1a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.6.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.7.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.12.4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.14.1a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.11.1a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.7.1a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "17.6.6"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-utd-snort3-dos-bypas-b4OUEwxD",
|
|
"refsource": "MISC",
|
|
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-utd-snort3-dos-bypas-b4OUEwxD"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "cisco-sa-utd-snort3-dos-bypas-b4OUEwxD",
|
|
"discovery": "INTERNAL",
|
|
"defects": [
|
|
"CSCwj21273"
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
|
"baseScore": 5.8,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
}
|
|
]
|
|
}
|
|
} |