Cisco Secure Firewall Threat Defense Software Snort Deep Inspection Bypass Vulnerability
A vulnerability in the Snort 2 and Snort 3 deep packet inspection engine of Cisco Secure Firewall Threat Defense (FTD) Software allows an unauthenticated, remote attacker to bypass configured Snort intrusion detection rules. A logic error in rule integration causes different Snort rules to be applied when inspecting inner and outer packet connections. An attacker can send crafted traffic that bypasses rule enforcement, allowing denial of service or data exfiltration traffic to reach the network when it should have been blocked. Affects Firepower 2100, 1000, 4100, 9000 Series; ASA 5500-X; 3000 Series Industrial Security Appliances; Secure Firewall Threat Defense Virtual, 3100, 4200, and 1200 Series.
- Network-accessible Cisco Secure Firewall Threat Defense device
- Snort deep packet inspection enabled on the firewall
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3841f8a1-35b7-43d4-9712-85e13b0f55dfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.