Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter.
This vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device.
Metrics
Affected Vendors & Products
References
History
Mon, 11 Aug 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco snort
|
|
| CPEs | cpe:2.3:a:cisco:firepower_threat_defense_software:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense_software:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:snort:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Cisco snort
|
Tue, 14 Jan 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 13 Jan 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter. This vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device. | Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter. This vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device. |
Thu, 24 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco firepower Threat Defense Software |
|
| CPEs | cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cisco
Cisco firepower Threat Defense Software |
|
| Metrics |
ssvc
|
Wed, 23 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter. This vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device. | |
| Title | Cisco Firepower Threat Defense Software Rate Filter Bypass Vulnerability | |
| Weaknesses | CWE-1025 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published: 2024-10-23T17:09:27.934Z
Updated: 2025-01-13T17:46:29.797Z
Reserved: 2023-11-08T15:08:07.643Z
Link: CVE-2024-20342
Updated: 2024-10-24T15:08:23.082Z
Status : Analyzed
Published: 2024-10-23T17:15:18.703
Modified: 2025-08-11T14:23:43.827
Link: CVE-2024-20342
No data.