CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:M/Au:S/C:N/I:N/A:C
EPSS
Percentile
5.1%
Cisco Intrusion Prevention System (IPS) SensorApp contains a vulnerability that could allow a local attacker to cause a denial of service (DoS) condition.
The vulnerability is due to a job failure in the Regex hardware when processing the control transaction getENGVirtualSensorStatistics. A local attacker could exploit the vulnerability by performing an action that uses the getENGVirtualSensorStatistics control transaction. When the malicious action is processed by the affected device, the SensorApp process may hang or become unresponsive to legitimate commands or control transactions, leading to a DoS condition.
Cisco has confirmed the vulnerability in a security notice and has released software updates.
This vulnerability is applicable only to platforms that implement Regex hardware.
Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.
To exploit this vulnerability, an attacker requires authenticated access to a targeted device and may require access to trusted, internal networks. These access requirements could limit the likelihood of a successful exploit.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | intrusion_prevention_system | any | cpe:2.3:a:cisco:intrusion_prevention_system:any:*:*:*:*:*:*:* |