Lucene search

K
ciscoCiscoCISCO-SA-FTDSNORT3SIP-BYPASS-LMZ2THKN
HistoryNov 01, 2023 - 4:00 p.m.

Cisco Firepower Threat Defense Software Snort 3 Geolocation IP Filter Bypass Vulnerability

2023-11-0116:00:00
tools.cisco.com
21
cisco
snort 3
geolocation
ip filter
bypass
vulnerability
remote attacker
software updates
workarounds

AI Score

7.4

Confidence

Low

EPSS

0.001

Percentile

26.8%

A vulnerability in the IP geolocation rules of Snort 3 could allow an unauthenticated, remote attacker to potentially bypass IP address restrictions.

This vulnerability exists because the configuration for IP geolocation rules is not parsed properly. An attacker could exploit this vulnerability by spoofing an IP address until they bypass the restriction. A successful exploit could allow the attacker to bypass location-based IP address restrictions.

Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdsnort3sip-bypass-LMz2ThKn [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdsnort3sip-bypass-LMz2ThKn”]

This advisory is part of the November 2023 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2023 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication [“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74985”].

Affected configurations

Vulners
Node
ciscofirepower_threat_defense_softwareMatchany
OR
ciscofirepower_threat_defense_softwareMatchany
VendorProductVersionCPE
ciscofirepower_threat_defense_softwareanycpe:2.3:a:cisco:firepower_threat_defense_software:any:*:*:*:*:*:*:*

AI Score

7.4

Confidence

Low

EPSS

0.001

Percentile

26.8%

Related for CISCO-SA-FTDSNORT3SIP-BYPASS-LMZ2THKN