Action not permitted
Modal body text goes here.
cve-2022-20943
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:31:57.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-snort-smb-3nfhJtr", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "7.0.0.1" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.0.1.1" } ] }, { "product": "Cisco Cyber Vision", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.2.3" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.2.4" }, { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "4.0.1" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "4.1.0" }, { "status": "affected", "version": "4.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device.\r\n\r These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition.\r\n\r Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details [\"#details\"] section of this advisory for more information.\r\n\r Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-244", "description": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:18.786Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-snort-smb-3nfhJtr", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr" } ], "source": { "advisory": "cisco-sa-snort-smb-3nfhJtr", "defects": [ "CSCvy97080", "CSCwb78519" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20943", "datePublished": "2022-11-10T17:37:31.385Z", "dateReserved": "2021-11-02T13:28:29.193Z", "dateUpdated": "2024-08-03T02:31:57.976Z", "requesterUserId": "4087f8c1-b21c-479b-99df-de23cb76b743", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-20943\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2022-11-15T21:15:35.077\",\"lastModified\":\"2024-01-25T17:15:21.030\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device.\\r\\n\\r These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition.\\r\\n\\r Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details [\\\"#details\\\"] section of this advisory for more information.\\r\\n\\r Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades en el procesador de Server Message Block Versi\u00f3n 2 (SMB2) del motor de detecci\u00f3n Snort en m\u00faltiples productos Cisco podr\u00edan permitir que un atacante remoto no autenticado omita las pol\u00edticas configuradas o cause una condici\u00f3n de Denegaci\u00f3n de Servicio (DoS) en un dispositivo afectado. Estas vulnerabilidades se deben a una gesti\u00f3n inadecuada de los recursos del sistema cuando el motor de detecci\u00f3n de Snort procesa el tr\u00e1fico SMB2. Un atacante podr\u00eda aprovechar estas vulnerabilidades enviando una alta tasa de ciertos tipos de paquetes SMB2 a trav\u00e9s de un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante activar una recarga del proceso Snort, lo que resultar\u00eda en una condici\u00f3n DoS. \\nNota: Cuando la opci\u00f3n Snort preserve-connection est\u00e1 habilitada para el motor de detecci\u00f3n de Snort, un exploit exitoso tambi\u00e9n podr\u00eda permitir al atacante eludir las pol\u00edticas configuradas y entregar un payload malicioso a la red protegida. La configuraci\u00f3n de conexi\u00f3n de preservaci\u00f3n de Snort est\u00e1 habilitada de forma predeterminada. Consulte la secci\u00f3n Detalles [\\\"\\\"#details\\\"\\\"] de este aviso para obtener m\u00e1s informaci\u00f3n. \\nNota: S\u00f3lo se ven afectados los productos que tienen Snort 3 configurado. Los productos configurados con Snort 2 no se ven afectados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\",\"baseScore\":5.8,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\",\"baseScore\":5.8,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-244\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBCA75A6-0A3E-4393-8884-9F3CE190641E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3C12D3-7662-46C5-9E88-D1BE6CF605E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046B53A0-6BC1-461A-9C28-C534CE12C4BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA889E1-4E8F-4ECE-88AC-7A240D5CBF0A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3297323C-B263-45EA-90CE-2B8415C9E498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"797AD8A4-083B-4A9E-A49D-65EE828E1637\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB16212-A9DC-4C8C-B220-9619C65436EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C64043F-1F0D-47F7-AEEE-309B239891DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1F7F871-C211-4DC6-8020-1075405BAE17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30E42800-B7C9-4006-8B7A-5A9A5F5EB234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE33F541-232E-4432-AB41-EC0500A85E6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D5B5FDC-79B2-447E-816F-1F630508A889\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B806EAC6-E1B2-40FB-9B2F-6AFB4A16AF89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7BAC55C-C114-4E64-BC9E-9000B8C016CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"925E6B9B-F7F1-4ED8-8431-282A1061B527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10EDC3E-0EF6-47DD-834D-51C5BBCC13EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB5F799E-6696-4391-9B58-06715FA4086A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE31D26B-CD47-4853-B1C3-2E50B0882AFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2758714C-4E9A-4442-9AD1-82D8E43995C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F63C0E4-99A9-4D4F-BCF9-EF5F5455C04C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13EA024C-97A4-4D33-BC3E-51DB77C51E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2224A9-96D6-4621-B3AD-D5E1C6884937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2B27A1F-E66D-4ADE-83B2-6D2457F49CC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cyber_vision:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50511288-D7A4-4EAE-8238-1E899EF16A9B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.6.7\",\"matchCriteriaId\":\"B2177697-7563-44BB-BD3B-D6F622F83B0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.0\",\"versionEndExcluding\":\"17.11.1\",\"matchCriteriaId\":\"09700C66-036B-47E2-9E3B-85CD44DDEF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"18.0\",\"versionEndExcluding\":\"18.1.3\",\"matchCriteriaId\":\"DD09153A-3BA1-4A5C-A730-0E9754E49ECE\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr\",\"source\":\"ykramarz@cisco.com\"}]}}" } }
var-202211-0835
Vulnerability from variot
Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device.
These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition.
Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details ["#details"] section of this advisory for more information.
Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected. Cisco Systems Cisco Firepower Threat Defense software, Cisco Cyber Vision , Cisco-Meraki MX Security Appliances There are unspecified vulnerabilities in the firmware.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0835", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.4" }, { "model": "firepower threat defense", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.0.1" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.2" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.3" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1.0" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.3" }, { "model": "meraki mx security appliance", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "18.0" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.1" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.0.3" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.0.2" }, { "model": "meraki mx security appliance", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "17.0" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1.1" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1.2" }, { "model": "firepower threat defense", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.0" }, { "model": "meraki mx security appliance", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "16.6.7" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.0.5" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.2" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1.0" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1.1" }, { "model": "firepower threat defense", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.1" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.0" }, { "model": "firepower threat defense", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.1.1" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.0.6" }, { "model": "meraki mx security appliance", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "17.11.1" }, { "model": "meraki mx security appliance", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.1.3" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.0.0" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.0.1" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.0" }, { "model": "cyber vision", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.1" }, { "model": "cisco cyber vision", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco firepower threat defense \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco-meraki mx security appliances", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-022978" }, { "db": "NVD", "id": "CVE-2022-20943" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:4.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:cyber_vision:4.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.1.3", "versionStartIncluding": "18.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "17.11.1", "versionStartIncluding": "17.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "16.6.7", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-20943" } ] }, "cve": "CVE-2022-20943", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.8, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-20943", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-20943", "trust": 1.8, "value": "MEDIUM" }, { "author": "ykramarz@cisco.com", "id": "CVE-2022-20943", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202211-2433", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-022978" }, { "db": "CNNVD", "id": "CNNVD-202211-2433" }, { "db": "NVD", "id": "CVE-2022-20943" }, { "db": "NVD", "id": "CVE-2022-20943" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. \r\n\r These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition. \r\n\r Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details [\"#details\"] section of this advisory for more information. \r\n\r Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected. Cisco Systems Cisco Firepower Threat Defense software, Cisco Cyber Vision , Cisco-Meraki MX Security Appliances There are unspecified vulnerabilities in the firmware.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-20943" }, { "db": "JVNDB", "id": "JVNDB-2022-022978" }, { "db": "VULHUB", "id": "VHN-405496" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-20943", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-022978", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2022.5774", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202211-2433", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-405496", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-405496" }, { "db": "JVNDB", "id": "JVNDB-2022-022978" }, { "db": "CNNVD", "id": "CNNVD-202211-2433" }, { "db": "NVD", "id": "CVE-2022-20943" } ] }, "id": "VAR-202211-0835", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-405496" } ], "trust": 0.01 }, "last_update_date": "2024-01-29T19:20:06.696000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-snort-smb-3nfhJtr", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-snort-smb-3nfhjtr" }, { "title": "Multiple Cisco Product security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213546" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-022978" }, { "db": "CNNVD", "id": "CNNVD-202211-2433" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-022978" }, { "db": "NVD", "id": "CVE-2022-20943" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-20943" }, { "trust": 1.3, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-snort-smb-3nfhjtr" }, { "trust": 1.0, "url": "https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-snort-smb-3nfhjtr" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/snort-meraki-mx-two-vulnerabilities-via-smb2-39885" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.5774" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-20943/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-405496" }, { "db": "JVNDB", "id": "JVNDB-2022-022978" }, { "db": "CNNVD", "id": "CNNVD-202211-2433" }, { "db": "NVD", "id": "CVE-2022-20943" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-405496" }, { "db": "JVNDB", "id": "JVNDB-2022-022978" }, { "db": "CNNVD", "id": "CNNVD-202211-2433" }, { "db": "NVD", "id": "CVE-2022-20943" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-15T00:00:00", "db": "VULHUB", "id": "VHN-405496" }, { "date": "2023-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-022978" }, { "date": "2022-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2433" }, { "date": "2022-11-15T21:15:35.077000", "db": "NVD", "id": "CVE-2022-20943" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-23T00:00:00", "db": "VULHUB", "id": "VHN-405496" }, { "date": "2023-11-24T01:53:00", "db": "JVNDB", "id": "JVNDB-2022-022978" }, { "date": "2022-11-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2433" }, { "date": "2024-01-25T17:15:21.030000", "db": "NVD", "id": "CVE-2022-20943" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2433" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerabilities in multiple Cisco Systems products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-022978" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2433" } ], "trust": 0.6 } }
cisco-sa-snort-smb-3nfhjtr
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "These vulnerabilities were found during the resolution of a Cisco TAC support case." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device.\r\n\r\nThese vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition.\r\n\r\nNote: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details [\"#details\"] section of this advisory for more information.\r\n\r\nNote: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected.\r\n\r\nCisco has released software updates that address these vulnerabilities. There are workarounds that address these vulnerabilities.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset\"]\r\n\r\nThis advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication [\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74838\"].", "title": "Summary" }, { "category": "general", "text": "At the time of publication, these vulnerabilities affected Open Source Snort 3.\r\n\r\nFor information about which Snort releases were vulnerable at the time of publication, see the Fixed Software [\"#fs\"] section of this advisory. For more information on Snort, see the Snort website [\"https://www.snort.org/\"].\r\n Impact to Cisco Products\r\nAt the time of publication, these vulnerabilities affected the following Cisco products if they were running a vulnerable release of Cisco software:\r\n\r\nCyber Vision\r\nFirePOWER Services - All platforms\r\nFirepower Threat Defense (FTD) Software - All platforms\r\nMeraki MX Security Appliances1\r\nUmbrella Secure Internet Gateway (SIG)\r\n\r\n1. See the Products Confirmed Not Vulnerable [\"#nv\"] section of this advisory for a list of Meraki devices that are not affected by these vulnerabilities.\r\nFor information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software [\"#fs\"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n Determine Cisco FTD Software Configuration\r\nOn new installations of Cisco FTD Software releases 7.0.0 and later, Snort 3 is running by default. On devices that were running Cisco FTD Software Release 6.7.0 or earlier and were upgraded to Release 7.0.0 or later, Snort 2 is running by default.\r\n Determine Cisco FTD Software Configuration Using the FTD Software CLI\r\nTo determine whether Snort 3 is configured on a device that is running Cisco FTD Software, log in to the Cisco FTD Software CLI and use the show snort3 status command. If the command produces the following output, the device is running Snort 3 and is affected by these vulnerabilities:\r\n\r\n\r\nshow snort3 status\r\nCurrently running Snort 3\r\n Determine Cisco FTD Software Configuration for Cisco Firepower Management Center Software-Managed Devices\r\nTo determine whether Snort 3 is configured on a device that is managed by Cisco Firepower Management Center (FMC) Software, complete the following steps:\r\n\r\nLog in to the Cisco FMC Software web interface.\r\nFrom the Devices menu, choose Device Management.\r\nChoose the appropriate Cisco FTD device.\r\nClick the Edit pencil icon.\r\nChoose the Device tab and look in the Inspection Engine area.\r\nIf Snort 2 is listed, the device is not affected by these vulnerabilities.\r\nIf Snort 3 is listed, the device is affected by these vulnerabilities.\r\n\r\n Determine Cisco FTD Software Configuration for Cisco Firepower Device Manager Software-Managed Devices\r\nTo determine whether Snort 3 is configured on a device that is managed by Cisco Firepower Device Manager (FDM) Software, complete the following steps:\r\n\r\nLog in to the Cisco FTD Software web interface.\r\nFrom the main menu, choose Policies.\r\nChoose the Intrusion tab.\r\nLook for the Inspection Engine version. The version will start with either a 2 for Snort 2 or a 3 for Snort 3.\r\nIf the device is running a Snort 2 version, it is not affected by these vulnerabilities.\r\nIf the device is running a Snort 3 version, it is affected by these vulnerabilities.\r\n\r\n Determine Cisco FTD Software Configuration for Cisco Defense Orchestrator-Managed Devices\r\nTo determine whether Snort 3 is configured on a device that is managed by Cisco Defense Orchestrator, complete the following steps:\r\n\r\nLog in to the Cisco Defense Orchestrator web interface.\r\nFrom the Inventory menu, choose the appropriate Cisco FTD device.\r\nIn the Device Details area, look for Snort Version. The version will start with either a 2 for Snort 2 or a 3 for Snort 3.\r\nIf the device is running a Snort 2 version, it is not affected by these vulnerabilities.\r\nIf the device is running a Snort 3 version, it is affected by these vulnerabilities.", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect the following products:\r\n\r\nCisco 1000 Series Integrated Services Routers (ISRs)\r\nCisco 4000 Series Integrated Services Routers (ISRs)\r\nCisco Adaptive Security Appliance (ASA) Software\r\nCisco Catalyst 8000V Edge Software\r\nCisco Catalyst 8200 Series Edge Platforms\r\nCisco Catalyst 8300 Series Edge Platforms\r\nCisco Catalyst 8500 Series Edge Platforms\r\nCisco Catalyst 8500L Series Edge Platforms\r\nCisco Cloud Services Routers 1000V\r\nCisco Firepower Management Center (FMC) Software\r\nCisco Meraki MX64 and MX64w Appliances\r\nCisco Meraki MX65 and MX65w Appliances\r\nCisco Integrated Services Virtual Routers (ISRv)\r\nOpen Source Snort 2", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "snort preserve-connection Settings\r\nThe impact of these vulnerabilities can be twofold, depending on whether the snort preserve-connection setting is enabled or disabled and whether a traffic flow began before the Snort process went down or began while the Snort process was down.\r\n\r\nThe behavior for traffic flows that were established before the Snort process went down is configuration dependent. The behavior for traffic flows that begin while the Snort process is down is not configuration dependent and always results in a DoS condition. For details on the snort preserve-connection setting, see the Cisco Secure Firewall Threat Defense Command Reference [\"https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/c_3.html#wp1594004510\"] and the Snort Restart Traffic Behavior [\"https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/policy_management.html#concept_uc1_gtq_ty\"] section of the Firepower Management Center Configuration Guide.\r\n snort preserve-connection Is Enabled\r\nWhen the snort preserve-connection option is enabled for the Snort detection engine, existing traffic flow are not dropped when the Snort process goes down. Instead, existing traffic flows bypass the Snort detection engine. A successful exploit could allow an attacker to bypass the configured policies and deliver a malicious payload to the protected network. Traffic flows that begin while the Snort process is down are dropped, resulting in a DoS condition.\r\n\r\nThe CVSS score for existing traffic flows is as follows: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N\r\n\r\nThe CVSS score for new traffic flows is as follows: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L\r\n snort preserve-connection Is Disabled\r\nWhen the snort preserve-connection option is disabled for the Snort detection engine, existing traffic flows are dropped. A successful exploit could result in a DoS condition. Traffic flows that begin while the Snort process is down are also dropped, resulting in a DoS condition.\r\n\r\nThe CVSS score is the same for both new and existing traffic flows: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L\r\n Determine the Cisco FTD Software Configuration\r\nThe snort preserve-connection setting is enabled by default. To view the current setting, log in to the Cisco FTD Software CLI and use the show running-config | include snort command. There are no GUI options for viewing the setting.\r\n\r\nIf the command produces the following output, snort preserve-connection is enabled on the device:\r\n\r\n\r\n\u003e show running-config | include snort\r\nsnort preserve-connection\r\n\u003e\r\n\r\nIf the command produces the following output, snort preserve-connection is disabled on the device:\r\n\r\n\r\n\u003e show running-config | include snort\r\nno snort preserve-connection\r\n\u003e", "title": "Details" }, { "category": "general", "text": "There is a workaround that addresses these vulnerabilities. To remove the attack vector for these vulnerabilities for Cisco FMC Software-managed devices and Cisco Defense Orchestrator-managed devices, configure a fastpath prefilter rule to bypass the Snort detection engine. To remove the attack vector for these vulnerabilities for Cisco Firepower Device Manager (FDM)-managed devices, configure an access control rule to bypass the Snort detection engine.\r\n Workaround for Cisco FMC Software-Managed Devices\r\nTo configure a fastpath prefilter rule for SMB traffic for Cisco FMC Software-managed devices, do the following:\r\n\r\nLog in to the FMC web interface.\r\nFrom the Policies menu, under the Access Control section, choose Prefilter.\r\nChoose New Policy.\r\nEnter the Name and Description and click Save.\r\nIn the resulting window, ensure that Default Action: Tunnel Traffic is set to Analyze all tunnel traffic.\r\nClick Add Prefilter Rule.\r\nIn the resulting window, enter a rule Name and ensure the Enabled box is checked.\r\nFrom the Action drop-down menu, choose Fastpath.\r\nConfigure the policy under the Interfaces, Networks, and Vlan Tags tabs for SMB traffic on the affected network.\r\nClick the Port tab.\r\nEnter the following destination ports for SMB traffic: TCP (6):138, TCP (6):139, TCP (6):445 and UDP (17):137.\r\nClick Add to add the policy.\r\nClick Save to save the policy.\r\n\r\nTo associate the SMB prefilter policy with the access control policy deployed on Cisco FMC Software-managed devices, do the following:\r\n\r\nFrom the Policies menu, under the Access Control section, choose Access Control.\r\nFind the policy of interest.\r\nClick the Edit icon.\r\nClick the name next to Prefilter Policy.\r\nChoose the name of the newly created SMB prefilter policy from the drop-down menu.\r\nClick OK.\r\n\r\nFor more information, see the Prefiltering and Prefilter Policies [\"https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/access-prefilter.html\"] chapter of the Firepower Management Center Device Configuration Guide.\r\n Workaround for Cisco FDM-Managed Devices\r\nFastpath is not supported on Cisco FDM-managed devices. Instead, set an access control policy with an action of trust for the appropriate ports.\r\n\r\nTo configure an access control policy to bypass SMB traffic for Cisco FDM-managed devices, do the following:\r\n\r\nLog in to the Cisco FDM web interface.\r\nFrom the Policies menu, choose Access Control.\r\nCreate a new policy by clicking the plus (+) sign.\r\nEnter a name and under the Action drop-down menu, choose Trust.\r\nIn the Port section, click the plus (+) sign.\r\nSelect Create new Port.\r\nEnter a name, protocol type, and port number for each of the following ports: TCP (6):138, TCP (6):139, TCP (6):445, and UDP (17):137.\r\nOnce the ports have been created, select the four ports to be added to the rule by selecting their names.\r\nClick OK when done.\r\nClick OK to add the policy.\r\nDeploy changes to Cisco FTD Software.\r\n\r\nFor more information, see the Access Control Chapter [\"https://www.cisco.com/c/en/us/td/docs/security/firepower/710/fdm/fptd-fdm-config-guide-710/fptd-fdm-access.html\"] of the Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager.\r\n Workaround for Cisco Defense Orchestrator-Managed Devices\r\nTo configure a fastpath prefilter rule for SMB traffic for Cisco Defense Orchestrator-managed devices, do the following:\r\n\r\nLog in to the Cisco Defense Orchestrator web interface.\r\nFrom the Policies menu, choose FTD Policies.\r\nFrom the Policies menu, under the Access Control section, choose Prefilter.\r\nClick New Policy.\r\nEnter the Name and Description and click Save.\r\nIn the resulting window, ensure that Default Action: Tunnel Traffic is set to Analyze all tunnel traffic.\r\nClick Add Prefilter Rule.\r\nIn the resulting window, enter a rule Name and ensure the Enabled box is checked.\r\nFrom the Action drop-down menu, select Fastpath.\r\nConfigure the policy under the Interfaces, Networks, and Vlan Tags tabs for SMB traffic on the affected network.\r\nClick the Port tab.\r\nEnter the following destination ports for SMB traffic: TCP (6):138, TCP (6):139, TCP (6):445, and UDP (17):137.\r\nClick Add to add the policy.\r\nClick Save to save the policy.\r\n\r\nTo associate the SMB prefilter policy with the access control policy deployed on Cisco Defense Orchestrator-managed devices, do the following:\r\n\r\nFrom the Policies menu, under the Access Control section, choose Access Control.\r\nFind the policy of interest.\r\nClick the Edit icon.\r\nClick the name next to Prefilter Policy.\r\nChoose the name of the newly created SMB prefilter policy from the drop-down menu.\r\nClick OK.\r\n\r\nFor more information, see the Cisco Defense Orchestrator website [\"https://docs.defenseorchestrator.com/\"].\r\n\r\nWhile this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.", "title": "Workarounds" }, { "category": "general", "text": "When considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Cisco ASA, FMC, and FTD Software: CSCwb87762 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb87762\"], CSCwb66736 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb66736\"], CSCwa55404 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa55404\"], CSCvy97080 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy97080\"]\r\nTo help customers determine their exposure to vulnerabilities in Cisco ASA, FMC, and FTD Software, Cisco provides the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"]. This tool identifies any Cisco security advisories that impact a specific software release and the earliest release that fixes the vulnerabilities that are described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories that the Software Checker identifies (\u201cCombined First Fixed\u201d).\r\n\r\nTo use the tool, go to the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] page and follow the instructions. Alternatively, use the following form to search for vulnerabilities that affect a specific software release. To use the form, follow these steps:\r\n\r\nChoose which advisories the tool will search\u2014all advisories, only High and Critical advisories, or only this advisory.\r\nChoose the appropriate software.\r\nChoose the appropriate platform (for Cisco ASA and FTD Software only).\r\nEnter a release number\u2014for example, 16.2.11 for Cisco ASA Software or 6.6.7 for Cisco FTD Software.\r\nClick Check.\r\n Only this advisory All Critical and High advisories All advisories Cisco ASA Software Cisco FMC Software Cisco FTD Software Any Platform 3000 Series Industrial Security Appliances (ISA) ASA 5500-X Series Firewalls ASA Service Module Adaptive Security Virtual Appliance (ASAv) Firepower 1000 Series Firepower 2100 Series Firepower 4100 Series Firepower 9000 Series Firepower NGFW Virtual Secure Firewall 3100 Series\r\n\r\n\r\n\r\n\r\nFor instructions on upgrading your FTD device, see Cisco Firepower Management Center Upgrade Guide [\"https://www.cisco.com/c/en/us/td/docs/security/firepower/upgrade/fpmc-upgrade-guide/getting_started.html\"].\r\n Cyber Vision: CSCwc37339 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwc37339\"], CSCwc37518 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwc37518\"], CSCwb78519 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb78519\"]\r\nAt the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n Cisco Cyber Vision Release First Fixed Release for CVE-2022-20922 and CVE-2022-20943 3.x Migrate to a fixed release. 4.0 Migrate to a fixed release. 4.1 4.1.2\r\n Meraki MX Security Appliances Cisco Meraki MX Security Appliances Release First Fixed Release for CVE-2022-20922 First Fixed Release for CVE-2022-20943 MX15 and earlier None planned. Migrate to a fixed release. MX16 None planned. Hotfix available for 16.16.7 MX17 None planned. Hotfix available for 17.11.1 MX18 None planned. Hotfix available for 18.1.3\r\n Snort: CSCwb87762 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb87762\"], CSCwb66736 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb66736\"], CSCwa55404 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa55404\"], CSCvy97080 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy97080\"] Snort Release First Fixed Release for CVE-2022-20922 First Fixed Release for CVE-2022-20943 2.x Not vulnerable Not vulnerable 3.x 3.1.31.0 Not vulnerable\r\n Umbrella SIG: CSCwb91454 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb91454\"]\r\nCisco plans to address these vulnerabilities in Cisco Umbrella SIG, which is cloud based. No user action is required.\r\n\r\nCustomers who need additional information are advised to contact Cisco Umbrella Support at umbrella-support@cisco.com [\"mailto:umbrella-support@cisco.com\"] or their contracted maintenance providers.\r\n Additional Resources\r\nFor help determining the best Cisco ASA, FTD, or FMC Software release, see the following Recommended Releases documents. If a security advisory recommends a later release, Cisco recommends following the advisory guidance.\r\n\r\nCisco ASA Compatibility [\"https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html\"]\r\nCisco Secure Firewall ASA Upgrade Guide [\"(https:/www.cisco.com/c/en/us/td/docs/security/asa/upgrade/asa-upgrade/planning.htmlx\"]\r\nCisco Secure Firewall Threat Defense Compatibility Guide [\"https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/compatibility/threat-defense-compatibility.html\"]\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "These vulnerabilities were found during the resolution of a Cisco TAC support case.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Multiple Cisco Products Snort SMB2 Detection Engine Policy Bypass and Denial of Service Vulnerabilities", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset" }, { "category": "external", "summary": "Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication", "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74838" }, { "category": "external", "summary": "Snort website", "url": "https://www.snort.org/" }, { "category": "external", "summary": "Cisco\u0026nbsp;Secure Firewall Threat Defense Command Reference", "url": "https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/c_3.html#wp1594004510" }, { "category": "external", "summary": "Snort Restart Traffic Behavior", "url": "https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/policy_management.html#concept_uc1_gtq_ty" }, { "category": "external", "summary": "Prefiltering and Prefilter Policies", "url": "https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/access-prefilter.html" }, { "category": "external", "summary": "Access Control Chapter", "url": "https://www.cisco.com/c/en/us/td/docs/security/firepower/710/fdm/fptd-fdm-config-guide-710/fptd-fdm-access.html" }, { "category": "external", "summary": "Cisco\u0026nbsp;Defense Orchestrator website", "url": "https://docs.defenseorchestrator.com/" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco\u0026nbsp;Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "CSCwb87762", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb87762" }, { "category": "external", "summary": "CSCwb66736", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb66736" }, { "category": "external", "summary": "CSCwa55404", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa55404" }, { "category": "external", "summary": "CSCvy97080", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy97080" }, { "category": "external", "summary": "Cisco\u0026nbsp;Software Checker", "url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x" }, { "category": "external", "summary": "Cisco Firepower Management Center Upgrade Guide", "url": "https://www.cisco.com/c/en/us/td/docs/security/firepower/upgrade/fpmc-upgrade-guide/getting_started.html" }, { "category": "external", "summary": "CSCwc37339", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwc37339" }, { "category": "external", "summary": "CSCwc37518", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwc37518" }, { "category": "external", "summary": "CSCwb78519", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb78519" }, { "category": "external", "summary": "CSCwb91454", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb91454" }, { "category": "external", "summary": "Cisco\u0026nbsp;ASA Compatibility", "url": "https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html" }, { "category": "external", "summary": "Cisco\u0026nbsp;Secure Firewall Threat Defense Compatibility Guide", "url": "https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/compatibility/threat-defense-compatibility.html" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html" } ], "title": "Multiple Cisco Products Snort SMB2 Detection Engine Policy Bypass and Denial of Service Vulnerabilities", "tracking": { "current_release_date": "2022-11-30T21:51:24+00:00", "generator": { "date": "2024-05-10T23:20:55+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-snort-smb-3nfhJtr", "initial_release_date": "2022-11-09T16:00:00+00:00", "revision_history": [ { "date": "2022-11-09T15:58:28+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2022-11-30T21:51:24+00:00", "number": "1.1.0", "summary": "Updated Meraki hotfix version from 16.6.7 to 16.16.7." } ], "status": "final", "version": "1.1.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "service_pack", "name": "7.0.0", "product": { "name": "7.0.0", "product_id": "CSAFPID-282695" } }, { "category": "service_pack", "name": "7.0.0.1", "product": { "name": "7.0.0.1", "product_id": "CSAFPID-284277" } }, { "category": "service_pack", "name": "7.0.1", "product": { "name": "7.0.1", "product_id": "CSAFPID-284789" } }, { "category": "service_pack", "name": "7.0.1.1", "product": { "name": "7.0.1.1", "product_id": "CSAFPID-286538" } } ], "category": "product_version", "name": "7.0" }, { "branches": [ { "category": "service_pack", "name": "7.1.0", "product": { "name": "7.1.0", "product_id": "CSAFPID-286091" } }, { "category": "service_pack", "name": "7.1.0.1", "product": { "name": "7.1.0.1", "product_id": "CSAFPID-286543" } }, { "category": "service_pack", "name": "7.1.0.2", "product": { "name": "7.1.0.2", "product_id": "CSAFPID-290467" } } ], "category": "product_version", "name": "7.1" }, { "branches": [ { "category": "service_pack", "name": "7.2.0", "product": { "name": "7.2.0", "product_id": "CSAFPID-287081" } }, { "category": "service_pack", "name": "7.2.0.1", "product": { "name": "7.2.0.1", "product_id": "CSAFPID-290469" } } ], "category": "product_version", "name": "7.2" } ], "category": "product_family", "name": "Cisco Firepower Threat Defense Software" }, { "category": "product_family", "name": "Cisco Umbrella Insights Virtual Appliance", "product": { "name": "Cisco Umbrella Insights Virtual Appliance ", "product_id": "CSAFPID-231188" } }, { "category": "product_family", "name": "Cisco Cyber Vision", "product": { "name": "Cisco Cyber Vision ", "product_id": "CSAFPID-278359" } }, { "category": "product_name", "name": "Cisco Firepower 2100 Series", "product": { "name": "Cisco Firepower 2100 Series", "product_id": "CSAFPID-277392" } }, { "category": "product_name", "name": "Cisco Firepower 1000 Series", "product": { "name": "Cisco Firepower 1000 Series", "product_id": "CSAFPID-277393" } }, { "category": "product_name", "name": "Cisco ASA 5500-X Series Firewalls", "product": { "name": "Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-277437" } }, { "category": "product_name", "name": "Cisco 3000 Series Industrial Security Appliances (ISA)", "product": { "name": "Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-277438" } }, { "category": "product_name", "name": "Cisco Firepower 9000 Series", "product": { "name": "Cisco Firepower 9000 Series", "product_id": "CSAFPID-277440" } }, { "category": "product_name", "name": "Cisco Firepower 4100 Series", "product": { "name": "Cisco Firepower 4100 Series", "product_id": "CSAFPID-277441" } }, { "category": "product_name", "name": "Cisco Secure Firewall Threat Defense Virtual", "product": { "name": "Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-277464" } }, { "category": "product_name", "name": "Cisco Secure Firewall 3100 Series", "product": { "name": "Cisco Secure Firewall 3100 Series", "product_id": "CSAFPID-286865" } } ], "category": "vendor", "name": "Cisco" } ], "relationships": [ { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-282695:277392" }, "product_reference": "CSAFPID-282695", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-282695:277393" }, "product_reference": "CSAFPID-282695", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-282695:277437" }, "product_reference": "CSAFPID-282695", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-282695:277438" }, "product_reference": "CSAFPID-282695", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-282695:277440" }, "product_reference": "CSAFPID-282695", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-282695:277441" }, "product_reference": "CSAFPID-282695", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-282695:277464" }, "product_reference": "CSAFPID-282695", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0.1 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-284277:277392" }, "product_reference": "CSAFPID-284277", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0.1 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-284277:277393" }, "product_reference": "CSAFPID-284277", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0.1 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-284277:277437" }, "product_reference": "CSAFPID-284277", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0.1 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-284277:277438" }, "product_reference": "CSAFPID-284277", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0.1 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-284277:277440" }, "product_reference": "CSAFPID-284277", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0.1 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-284277:277441" }, "product_reference": "CSAFPID-284277", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.0.1 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-284277:277464" }, "product_reference": "CSAFPID-284277", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-284789:277392" }, "product_reference": "CSAFPID-284789", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-284789:277393" }, "product_reference": "CSAFPID-284789", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-284789:277437" }, "product_reference": "CSAFPID-284789", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-284789:277438" }, "product_reference": "CSAFPID-284789", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-284789:277440" }, "product_reference": "CSAFPID-284789", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-284789:277441" }, "product_reference": "CSAFPID-284789", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-284789:277464" }, "product_reference": "CSAFPID-284789", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1.1 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-286538:277392" }, "product_reference": "CSAFPID-286538", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1.1 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-286538:277393" }, "product_reference": "CSAFPID-286538", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1.1 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-286538:277437" }, "product_reference": "CSAFPID-286538", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1.1 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-286538:277438" }, "product_reference": "CSAFPID-286538", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1.1 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-286538:277440" }, "product_reference": "CSAFPID-286538", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1.1 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-286538:277441" }, "product_reference": "CSAFPID-286538", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.0.1.1 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-286538:277464" }, "product_reference": "CSAFPID-286538", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-286091:277392" }, "product_reference": "CSAFPID-286091", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-286091:277393" }, "product_reference": "CSAFPID-286091", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-286091:277438" }, "product_reference": "CSAFPID-286091", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-286091:277440" }, "product_reference": "CSAFPID-286091", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-286091:277441" }, "product_reference": "CSAFPID-286091", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-286091:277464" }, "product_reference": "CSAFPID-286091", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0 when installed on Cisco Secure Firewall 3100 Series", "product_id": "CSAFPID-286091:286865" }, "product_reference": "CSAFPID-286091", "relates_to_product_reference": "CSAFPID-286865" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0.1 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-286543:277392" }, "product_reference": "CSAFPID-286543", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0.1 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-286543:277393" }, "product_reference": "CSAFPID-286543", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0.1 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-286543:277438" }, "product_reference": "CSAFPID-286543", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0.1 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-286543:277440" }, "product_reference": "CSAFPID-286543", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0.1 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-286543:277441" }, "product_reference": "CSAFPID-286543", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0.1 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-286543:277464" }, "product_reference": "CSAFPID-286543", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.1.0.2 when installed on Cisco Secure Firewall 3100 Series", "product_id": "CSAFPID-290467:286865" }, "product_reference": "CSAFPID-290467", "relates_to_product_reference": "CSAFPID-286865" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-287081:277392" }, "product_reference": "CSAFPID-287081", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-287081:277393" }, "product_reference": "CSAFPID-287081", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-287081:277438" }, "product_reference": "CSAFPID-287081", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-287081:277440" }, "product_reference": "CSAFPID-287081", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-287081:277441" }, "product_reference": "CSAFPID-287081", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-287081:277464" }, "product_reference": "CSAFPID-287081", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0 when installed on Cisco Secure Firewall 3100 Series", "product_id": "CSAFPID-287081:286865" }, "product_reference": "CSAFPID-287081", "relates_to_product_reference": "CSAFPID-286865" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0.1 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-290469:277392" }, "product_reference": "CSAFPID-290469", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0.1 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-290469:277393" }, "product_reference": "CSAFPID-290469", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0.1 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-290469:277438" }, "product_reference": "CSAFPID-290469", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0.1 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-290469:277440" }, "product_reference": "CSAFPID-290469", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0.1 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-290469:277441" }, "product_reference": "CSAFPID-290469", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0.1 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-290469:277464" }, "product_reference": "CSAFPID-290469", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 7.2.0.1 when installed on Cisco Secure Firewall 3100 Series", "product_id": "CSAFPID-290469:286865" }, "product_reference": "CSAFPID-290469", "relates_to_product_reference": "CSAFPID-286865" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-20943", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvy97080" }, { "system_name": "Cisco Bug ID", "text": "CSCwb78519" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-282695:277392", "CSAFPID-282695:277393", "CSAFPID-282695:277437", "CSAFPID-282695:277438", "CSAFPID-282695:277440", "CSAFPID-282695:277441", "CSAFPID-282695:277464", "CSAFPID-284277:277392", "CSAFPID-284277:277393", "CSAFPID-284277:277437", "CSAFPID-284277:277438", "CSAFPID-284277:277440", "CSAFPID-284277:277441", "CSAFPID-284277:277464", "CSAFPID-284789:277392", "CSAFPID-284789:277393", "CSAFPID-284789:277437", "CSAFPID-284789:277438", "CSAFPID-284789:277440", "CSAFPID-284789:277441", "CSAFPID-284789:277464", "CSAFPID-286538:277392", "CSAFPID-286538:277393", "CSAFPID-286538:277437", "CSAFPID-286538:277438", "CSAFPID-286538:277440", "CSAFPID-286538:277441", "CSAFPID-286538:277464", "CSAFPID-278359" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278359", "CSAFPID-282695:277392", "CSAFPID-282695:277393", "CSAFPID-282695:277437", "CSAFPID-282695:277438", "CSAFPID-282695:277440", "CSAFPID-282695:277441", "CSAFPID-282695:277464", "CSAFPID-284277:277392", "CSAFPID-284277:277393", "CSAFPID-284277:277437", "CSAFPID-284277:277438", "CSAFPID-284277:277440", "CSAFPID-284277:277441", "CSAFPID-284277:277464", "CSAFPID-284789:277392", "CSAFPID-284789:277393", "CSAFPID-284789:277437", "CSAFPID-284789:277438", "CSAFPID-284789:277440", "CSAFPID-284789:277441", "CSAFPID-284789:277464", "CSAFPID-286538:277392", "CSAFPID-286538:277393", "CSAFPID-286538:277437", "CSAFPID-286538:277438", "CSAFPID-286538:277440", "CSAFPID-286538:277441", "CSAFPID-286538:277464" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-282695:277392", "CSAFPID-282695:277393", "CSAFPID-282695:277437", "CSAFPID-282695:277438", "CSAFPID-282695:277440", "CSAFPID-282695:277441", "CSAFPID-282695:277464", "CSAFPID-284277:277392", "CSAFPID-284277:277393", "CSAFPID-284277:277437", "CSAFPID-284277:277438", "CSAFPID-284277:277440", "CSAFPID-284277:277441", "CSAFPID-284277:277464", "CSAFPID-284789:277392", "CSAFPID-284789:277393", "CSAFPID-284789:277437", "CSAFPID-284789:277438", "CSAFPID-284789:277440", "CSAFPID-284789:277441", "CSAFPID-284789:277464", "CSAFPID-286538:277392", "CSAFPID-286538:277393", "CSAFPID-286538:277437", "CSAFPID-286538:277438", "CSAFPID-286538:277440", "CSAFPID-286538:277441", "CSAFPID-286538:277464", "CSAFPID-278359" ] } ], "title": "Multiple Cisco Products Snort SMB2 Detection Engine Policy Bypass and Denial of Service Vulnerability" }, { "cve": "CVE-2022-20922", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwa55404" }, { "system_name": "Cisco Bug ID", "text": "CSCwb66736" }, { "system_name": "Cisco Bug ID", "text": "CSCwb87762" }, { "system_name": "Cisco Bug ID", "text": "CSCwb91454" }, { "system_name": "Cisco Bug ID", "text": "CSCwc37518" }, { "system_name": "Cisco Bug ID", "text": "CSCwc37339" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-286091:277392", "CSAFPID-286091:277393", "CSAFPID-286091:277438", "CSAFPID-286091:277440", "CSAFPID-286091:277441", "CSAFPID-286091:277464", "CSAFPID-286091:286865", "CSAFPID-286543:277392", "CSAFPID-286543:277393", "CSAFPID-286543:277438", "CSAFPID-286543:277440", "CSAFPID-286543:277441", "CSAFPID-286543:277464", "CSAFPID-287081:277392", "CSAFPID-287081:277393", "CSAFPID-287081:277438", "CSAFPID-287081:277440", "CSAFPID-287081:277441", "CSAFPID-287081:277464", "CSAFPID-287081:286865", "CSAFPID-290467:286865", "CSAFPID-290469:277392", "CSAFPID-290469:277393", "CSAFPID-290469:277438", "CSAFPID-290469:277440", "CSAFPID-290469:277441", "CSAFPID-290469:277464", "CSAFPID-290469:286865", "CSAFPID-231188", "CSAFPID-278359" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-278359", "CSAFPID-231188", "CSAFPID-286091:277392", "CSAFPID-286091:277393", "CSAFPID-286091:277438", "CSAFPID-286091:277440", "CSAFPID-286091:277441", "CSAFPID-286091:277464", "CSAFPID-286091:286865", "CSAFPID-286543:277392", "CSAFPID-286543:277393", "CSAFPID-286543:277438", "CSAFPID-286543:277440", "CSAFPID-286543:277441", "CSAFPID-286543:277464", "CSAFPID-287081:277392", "CSAFPID-287081:277393", "CSAFPID-287081:277438", "CSAFPID-287081:277440", "CSAFPID-287081:277441", "CSAFPID-287081:277464", "CSAFPID-287081:286865", "CSAFPID-290467:286865", "CSAFPID-290469:277392", "CSAFPID-290469:277393", "CSAFPID-290469:277438", "CSAFPID-290469:277440", "CSAFPID-290469:277441", "CSAFPID-290469:277464", "CSAFPID-290469:286865" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-286091:277392", "CSAFPID-286091:277393", "CSAFPID-286091:277438", "CSAFPID-286091:277440", "CSAFPID-286091:277441", "CSAFPID-286091:277464", "CSAFPID-286091:286865", "CSAFPID-286543:277392", "CSAFPID-286543:277393", "CSAFPID-286543:277438", "CSAFPID-286543:277440", "CSAFPID-286543:277441", "CSAFPID-286543:277464", "CSAFPID-287081:277392", "CSAFPID-287081:277393", "CSAFPID-287081:277438", "CSAFPID-287081:277440", "CSAFPID-287081:277441", "CSAFPID-287081:277464", "CSAFPID-287081:286865", "CSAFPID-290467:286865", "CSAFPID-290469:277392", "CSAFPID-290469:277393", "CSAFPID-290469:277438", "CSAFPID-290469:277440", "CSAFPID-290469:277441", "CSAFPID-290469:277464", "CSAFPID-290469:286865", "CSAFPID-231188", "CSAFPID-278359" ] } ], "title": "Multiple Cisco Products Snort SMB2 Detection Engine Policy Bypass and Denial of Service Vulnerability" } ] }
gsd-2022-20943
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-20943", "description": "Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition. Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details [\"#details\"] section of this advisory for more information. Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected.", "id": "GSD-2022-20943" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-20943" ], "details": "Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition. Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details [\"#details\"] section of this advisory for more information. Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected.", "id": "GSD-2022-20943", "modified": "2023-12-13T01:19:17.159684Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2022-20943", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Firepower Threat Defense Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "7.0.0" }, { "version_affected": "=", "version_value": "7.0.0.1" }, { "version_affected": "=", "version_value": "7.0.1" }, { "version_affected": "=", "version_value": "7.0.1.1" } ] } }, { "product_name": "Cisco Cyber Vision", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.4" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.0.1" }, { "version_affected": "=", "version_value": "3.0.2" }, { "version_affected": "=", "version_value": "3.0.3" }, { "version_affected": "=", "version_value": "3.0.5" }, { "version_affected": "=", "version_value": "3.0.6" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.2" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.2.3" }, { "version_affected": "=", "version_value": "3.2.1" }, { "version_affected": "=", "version_value": "3.2.4" }, { "version_affected": "=", "version_value": "3.2.0" }, { "version_affected": "=", "version_value": "3.2.2" }, { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "4.0.1" }, { "version_affected": "=", "version_value": "4.0.2" }, { "version_affected": "=", "version_value": "4.0.3" }, { "version_affected": "=", "version_value": "4.1.0" }, { "version_affected": "=", "version_value": "4.1.1" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device.\r\n\r These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition.\r\n\r Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details [\"#details\"] section of this advisory for more information.\r\n\r Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-244", "lang": "eng", "value": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr", "refsource": "MISC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr" } ] }, "source": { "advisory": "cisco-sa-snort-smb-3nfhJtr", "defects": [ "CSCvy97080", "CSCwb78519" ], "discovery": "EXTERNAL" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BBCA75A6-0A3E-4393-8884-9F3CE190641E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3F3C12D3-7662-46C5-9E88-D1BE6CF605E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "046B53A0-6BC1-461A-9C28-C534CE12C4BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3CA889E1-4E8F-4ECE-88AC-7A240D5CBF0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3297323C-B263-45EA-90CE-2B8415C9E498", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "797AD8A4-083B-4A9E-A49D-65EE828E1637", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4EB16212-A9DC-4C8C-B220-9619C65436EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9C64043F-1F0D-47F7-AEEE-309B239891DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E1F7F871-C211-4DC6-8020-1075405BAE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "30E42800-B7C9-4006-8B7A-5A9A5F5EB234", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE33F541-232E-4432-AB41-EC0500A85E6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8D5B5FDC-79B2-447E-816F-1F630508A889", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B806EAC6-E1B2-40FB-9B2F-6AFB4A16AF89", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7BAC55C-C114-4E64-BC9E-9000B8C016CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "925E6B9B-F7F1-4ED8-8431-282A1061B527", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A10EDC3E-0EF6-47DD-834D-51C5BBCC13EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "BB5F799E-6696-4391-9B58-06715FA4086A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EE31D26B-CD47-4853-B1C3-2E50B0882AFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2758714C-4E9A-4442-9AD1-82D8E43995C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F63C0E4-99A9-4D4F-BCF9-EF5F5455C04C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "13EA024C-97A4-4D33-BC3E-51DB77C51E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "4A2224A9-96D6-4621-B3AD-D5E1C6884937", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2B27A1F-E66D-4ADE-83B2-6D2457F49CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:cyber_vision:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "50511288-D7A4-4EAE-8238-1E899EF16A9B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2177697-7563-44BB-BD3B-D6F622F83B0B", "versionEndExcluding": "16.6.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09700C66-036B-47E2-9E3B-85CD44DDEF4F", "versionEndExcluding": "17.11.1", "versionStartIncluding": "17.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD09153A-3BA1-4A5C-A730-0E9754E49ECE", "versionEndExcluding": "18.1.3", "versionStartIncluding": "18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device.\r\n\r These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition.\r\n\r Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details [\"#details\"] section of this advisory for more information.\r\n\r Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en el procesador de Server Message Block Versi\u00f3n 2 (SMB2) del motor de detecci\u00f3n Snort en m\u00faltiples productos Cisco podr\u00edan permitir que un atacante remoto no autenticado omita las pol\u00edticas configuradas o cause una condici\u00f3n de Denegaci\u00f3n de Servicio (DoS) en un dispositivo afectado. Estas vulnerabilidades se deben a una gesti\u00f3n inadecuada de los recursos del sistema cuando el motor de detecci\u00f3n de Snort procesa el tr\u00e1fico SMB2. Un atacante podr\u00eda aprovechar estas vulnerabilidades enviando una alta tasa de ciertos tipos de paquetes SMB2 a trav\u00e9s de un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante activar una recarga del proceso Snort, lo que resultar\u00eda en una condici\u00f3n DoS. \nNota: Cuando la opci\u00f3n Snort preserve-connection est\u00e1 habilitada para el motor de detecci\u00f3n de Snort, un exploit exitoso tambi\u00e9n podr\u00eda permitir al atacante eludir las pol\u00edticas configuradas y entregar un payload malicioso a la red protegida. La configuraci\u00f3n de conexi\u00f3n de preservaci\u00f3n de Snort est\u00e1 habilitada de forma predeterminada. Consulte la secci\u00f3n Detalles [\"\"#details\"\"] de este aviso para obtener m\u00e1s informaci\u00f3n. \nNota: S\u00f3lo se ven afectados los productos que tienen Snort 3 configurado. Los productos configurados con Snort 2 no se ven afectados." } ], "id": "CVE-2022-20943", "lastModified": "2024-01-25T17:15:21.030", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" } ] }, "published": "2022-11-15T21:15:35.077", "references": [ { "source": "ykramarz@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-244" } ], "source": "ykramarz@cisco.com", "type": "Secondary" } ] } } } }
ghsa-wfgx-7r85-fvqv
Vulnerability from github
Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition. Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details ["#details"] section of this advisory for more information. Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected.
{ "affected": [], "aliases": [ "CVE-2022-20943" ], "database_specific": { "cwe_ids": [ "CWE-244" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-11-15T21:15:00Z", "severity": "MODERATE" }, "details": "Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition. Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details [\"#details\"] section of this advisory for more information. Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected.", "id": "GHSA-wfgx-7r85-fvqv", "modified": "2022-11-23T15:30:22Z", "published": "2022-11-16T12:00:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20943" }, { "type": "WEB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.