gsd-2023-20071
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and deliver a malicious payload.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-20071", "id": "GSD-2023-20071" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-20071" ], "details": "Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and deliver a malicious payload.", "id": "GSD-2023-20071", "modified": "2023-12-13T01:20:28.038554Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2023-20071", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Firepower Threat Defense Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.2.3" }, { "version_affected": "=", "version_value": "6.2.3.1" }, { "version_affected": "=", "version_value": "6.2.3.2" }, { "version_affected": "=", "version_value": "6.2.3.3" }, { "version_affected": "=", "version_value": "6.2.3.4" }, { "version_affected": "=", "version_value": "6.2.3.5" }, { "version_affected": "=", "version_value": "6.2.3.6" }, { "version_affected": "=", "version_value": "6.2.3.7" }, { "version_affected": "=", "version_value": "6.2.3.8" }, { "version_affected": "=", "version_value": "6.2.3.10" }, { "version_affected": "=", "version_value": "6.2.3.11" }, { "version_affected": "=", "version_value": "6.2.3.9" }, { "version_affected": "=", "version_value": "6.2.3.12" }, { "version_affected": "=", "version_value": "6.2.3.13" }, { "version_affected": "=", "version_value": "6.2.3.14" }, { "version_affected": "=", "version_value": "6.2.3.15" }, { "version_affected": "=", "version_value": "6.2.3.16" }, { "version_affected": "=", "version_value": "6.2.3.17" }, { "version_affected": "=", "version_value": "6.2.3.18" }, { "version_affected": "=", "version_value": "6.6.0" }, { "version_affected": "=", "version_value": "6.6.0.1" }, { "version_affected": "=", "version_value": "6.6.1" }, { "version_affected": "=", "version_value": "6.6.3" }, { "version_affected": "=", "version_value": "6.6.4" }, { "version_affected": "=", "version_value": "6.6.5" }, { "version_affected": "=", "version_value": "6.6.5.1" }, { "version_affected": "=", "version_value": "6.6.5.2" }, { "version_affected": "=", "version_value": "6.6.7" }, { "version_affected": "=", "version_value": "6.6.7.1" }, { "version_affected": "=", "version_value": "6.4.0" }, { "version_affected": "=", "version_value": "6.4.0.1" }, { "version_affected": "=", "version_value": "6.4.0.3" }, { "version_affected": "=", "version_value": "6.4.0.2" }, { "version_affected": "=", "version_value": "6.4.0.4" }, { "version_affected": "=", "version_value": "6.4.0.5" }, { "version_affected": "=", "version_value": "6.4.0.6" }, { "version_affected": "=", "version_value": "6.4.0.7" }, { "version_affected": "=", "version_value": "6.4.0.8" }, { "version_affected": "=", "version_value": "6.4.0.9" }, { "version_affected": "=", "version_value": "6.4.0.10" }, { "version_affected": "=", "version_value": "6.4.0.11" }, { "version_affected": "=", "version_value": "6.4.0.12" }, { "version_affected": "=", "version_value": "6.4.0.13" }, { "version_affected": "=", "version_value": "6.4.0.14" }, { "version_affected": "=", "version_value": "6.4.0.15" }, { "version_affected": "=", "version_value": "6.4.0.16" }, { "version_affected": "=", "version_value": "6.7.0" }, { "version_affected": "=", "version_value": "6.7.0.1" }, { "version_affected": "=", "version_value": "6.7.0.2" }, { "version_affected": "=", "version_value": "6.7.0.3" }, { "version_affected": "=", "version_value": "7.0.0" }, { "version_affected": "=", "version_value": "7.0.0.1" }, { "version_affected": "=", "version_value": "7.0.1" }, { "version_affected": "=", "version_value": "7.0.1.1" }, { "version_affected": "=", "version_value": "7.0.2" }, { "version_affected": "=", "version_value": "7.0.2.1" }, { "version_affected": "=", "version_value": "7.0.3" }, { "version_affected": "=", "version_value": "7.0.4" }, { "version_affected": "=", "version_value": "7.0.5" }, { "version_affected": "=", "version_value": "7.1.0" }, { "version_affected": "=", "version_value": "7.1.0.1" }, { "version_affected": "=", "version_value": "7.1.0.2" }, { "version_affected": "=", "version_value": "7.1.0.3" }, { "version_affected": "=", "version_value": "7.2.0" }, { "version_affected": "=", "version_value": "7.2.0.1" }, { "version_affected": "=", "version_value": "7.2.1" }, { "version_affected": "=", "version_value": "7.2.2" }, { "version_affected": "=", "version_value": "7.2.3" }, { "version_affected": "=", "version_value": "7.3.0" }, { "version_affected": "=", "version_value": "7.3.1" }, { "version_affected": "=", "version_value": "7.3.1.1" } ] } }, { "product_name": "Cisco Umbrella Insights Virtual Appliance", "version": { "version_data": [ { "version_affected": "=", "version_value": "N/A" } ] } }, { "product_name": "Cisco Cyber Vision", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.4" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.0.1" }, { "version_affected": "=", "version_value": "3.0.2" }, { "version_affected": "=", "version_value": "3.0.3" }, { "version_affected": "=", "version_value": "3.0.5" }, { "version_affected": "=", "version_value": "3.0.6" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.2" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.2.3" }, { "version_affected": "=", "version_value": "3.2.1" }, { "version_affected": "=", "version_value": "3.2.4" }, { "version_affected": "=", "version_value": "3.2.0" }, { "version_affected": "=", "version_value": "3.2.2" }, { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "4.0.1" }, { "version_affected": "=", "version_value": "4.0.2" }, { "version_affected": "=", "version_value": "4.0.3" }, { "version_affected": "=", "version_value": "4.1.0" }, { "version_affected": "=", "version_value": "4.1.1" }, { "version_affected": "=", "version_value": "4.1.2" } ] } }, { "product_name": "Cisco UTD SNORT IPS Engine Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "16.12.1a" }, { "version_affected": "=", "version_value": "16.12.2" }, { "version_affected": "=", "version_value": "16.12.3" }, { "version_affected": "=", "version_value": "16.12.4" }, { "version_affected": "=", "version_value": "16.12.5" }, { "version_affected": "=", "version_value": "16.12.6" }, { "version_affected": "=", "version_value": "16.12.7" }, { "version_affected": "=", "version_value": "16.12.8" }, { "version_affected": "=", "version_value": "16.6.1" }, { "version_affected": "=", "version_value": "16.6.5" }, { "version_affected": "=", "version_value": "16.6.6" }, { "version_affected": "=", "version_value": "16.6.7a" }, { "version_affected": "=", "version_value": "16.6.9" }, { "version_affected": "=", "version_value": "16.6.10" }, { "version_affected": "=", "version_value": "17.1.1" }, { "version_affected": "=", "version_value": "17.2.1r" }, { "version_affected": "=", "version_value": "17.3.1a" }, { "version_affected": "=", "version_value": "17.3.2" }, { "version_affected": "=", "version_value": "17.3.3" }, { "version_affected": "=", "version_value": "17.3.4a" }, { "version_affected": "=", "version_value": "17.3.6" }, { "version_affected": "=", "version_value": "17.3.5" }, { "version_affected": "=", "version_value": "17.3.7" }, { "version_affected": "=", "version_value": "3.17.0S" }, { "version_affected": "=", "version_value": "3.17.1S" }, { "version_affected": "=", "version_value": "17.4.1a" }, { "version_affected": "=", "version_value": "17.4.2" }, { "version_affected": "=", "version_value": "17.4.1b" }, { "version_affected": "=", "version_value": "17.5.1a" }, { "version_affected": "=", "version_value": "17.6.1a" }, { "version_affected": "=", "version_value": "17.6.2" }, { "version_affected": "=", "version_value": "17.6.3a" }, { "version_affected": "=", "version_value": "17.6.4" }, { "version_affected": "=", "version_value": "17.6.5" }, { "version_affected": "=", "version_value": "17.7.1a" }, { "version_affected": "=", "version_value": "17.7.2" }, { "version_affected": "=", "version_value": "17.10.1a" }, { "version_affected": "=", "version_value": "17.9.1a" }, { "version_affected": "=", "version_value": "17.9.2a" }, { "version_affected": "=", "version_value": "17.9.3a" }, { "version_affected": "=", "version_value": "17.8.1a" }, { "version_affected": "=", "version_value": "Fuji-16.9.2" }, { "version_affected": "=", "version_value": "Fuji-16.9.4" }, { "version_affected": "=", "version_value": "Fuji-16.9.6" }, { "version_affected": "=", "version_value": "Fuji-16.9.3" }, { "version_affected": "=", "version_value": "Fuji-16.9.7" }, { "version_affected": "=", "version_value": "Fuji-16.9.8" }, { "version_affected": "=", "version_value": "Fuji-16.9.5" }, { "version_affected": "=", "version_value": "Denali-16.3.3" }, { "version_affected": "=", "version_value": "Denali-16.3.9" }, { "version_affected": "=", "version_value": "Denali-16.3.7" }, { "version_affected": "=", "version_value": "Denali-16.3.5" }, { "version_affected": "=", "version_value": "Denali-16.3.4" }, { "version_affected": "=", "version_value": "Everest-16.6.3" }, { "version_affected": "=", "version_value": "Everest-16.6.4" }, { "version_affected": "=", "version_value": "Everest-16.6.2" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and deliver a malicious payload." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-1039", "lang": "eng", "value": "Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations" } ] } ] }, "references": { "reference_data": [ { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ftd-zXYtnjOM", "refsource": "MISC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ftd-zXYtnjOM" } ] }, "source": { "advisory": "cisco-sa-snort-ftd-zXYtnjOM", "defects": [ "CSCwb69096", "CSCwd83613", "CSCwd09631", "CSCwe02137", "CSCwe57521" ], "discovery": "INTERNAL" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "C62E4A4C-EE6D-49B5-ADCC-21386CD9F2D9", "versionEndExcluding": "6.4.0.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2A381B6-2AEF-4A0F-A151-8C3CEBBA7AC2", "versionEndExcluding": "7.0.6", "versionStartIncluding": "6.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB0ABE0D-B90E-45BD-8978-DD6EBC863EC6", "versionEndExcluding": "7.2.4", "versionStartIncluding": "7.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "233409FB-3D8D-41A9-BEC6-8A0E758717ED", "versionEndExcluding": "7.3.1.2", "versionStartIncluding": "7.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:snort:snort:2.0:-:*:*:*:*:*:*", "matchCriteriaId": "4C27CF59-184F-4FFD-9CE8-87F2589EB5AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "7792398D-F563-4441-900D-ABFECAA884AF", "versionEndExcluding": "7.0.5", "versionStartIncluding": "6.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F64FDF4-9696-4FC8-9ADA-DF1727EF1A63", "versionEndExcluding": "7.1.0.3", "versionStartIncluding": "7.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "F712E334-BA34-4D9C-9E72-DBEFCF9B0E66", "versionEndExcluding": "7.2.1", "versionStartIncluding": "7.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5D0C2A5-A925-475B-8B2F-F8E3F27C0876", "versionEndExcluding": "3.1.32.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:cyber_vision:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA9E447-86A4-46AC-9D6B-55D6F8664488", "versionEndExcluding": "4.1.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE0EDFC9-F9CD-487F-AB5C-38E8340BF427", "versionEndExcluding": "17.3.8", "versionStartIncluding": "17.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "85C85786-8BA2-4194-9A07-9F8E676E75C9", "versionEndExcluding": "17.6.6", "versionStartIncluding": "17.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "B50A5D29-0995-469D-86B8-0C5473FC54FC", "versionEndExcluding": "17.9.4", "versionStartIncluding": "17.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DB2D2F1-FB90-485D-B6B4-B6E0A9351C95", "versionEndExcluding": "17.11.1a", "versionStartIncluding": "17.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC04A2AB-CAAA-4723-90FD-C35CED76E029", "versionEndExcluding": "17.12.1a", "versionStartIncluding": "17.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C60FD7B-F41F-4307-B3F4-905E7B7C17AF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and deliver a malicious payload." }, { "lang": "es", "value": "Varios productos de Cisco se ven afectados por una vulnerabilidad en el motor de detecci\u00f3n Snort que podr\u00eda permitir que un atacante remoto no autenticado omitir las pol\u00edticas configuradas en un sistema afectado. Esta vulnerabilidad se debe a una falla en el m\u00f3dulo FTP del motor de detecci\u00f3n de Snort. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tr\u00e1fico FTP manipulado a trav\u00e9s de un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante omitir la inspecci\u00f3n de FTP y entregar un payload maliciosa." } ], "id": "CVE-2023-20071", "lastModified": "2024-01-25T17:15:28.550", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" } ] }, "published": "2023-11-01T18:15:09.090", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ftd-zXYtnjOM" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-1039" } ], "source": "ykramarz@cisco.com", "type": "Secondary" } ] } } } }
Loading...