Cisco Secure Firewall Threat Defense Software Snort 3 SSL Memory Management Denial of Service Vulnerability
A logic error in Snort 3 SSL packet inspection on Cisco Secure Firewall Threat Defense Software can be exploited by sending crafted SSL packets through an established connection, causing the Snort 3 Detection Engine to unexpectedly restart. This creates a temporary denial of service condition during which threat inspection is unavailable. The vulnerability affects all versions of Secure Firewall 4200, 3100, 1200 Series, Firepower 2100, 1000, 9000, 4100 Series, Firepower Industrial Security Appliances (3000 Series), and Secure Firewall Threat Defense Virtual appliances.
- Network path to your Cisco Secure Firewall must allow SSL traffic
- Snort 3 SSL inspection must be enabled on the firewall
- Attacker must have ability to send traffic through an established connection
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c4706fe2-bde7-4064-af5c-2a6d65a40369Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.