Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-20342


Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter.  This vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device.


Published

2024-10-23T17:15:18.703

Last Modified

2025-08-11T14:23:43.827

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 5.8 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-1025

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco snort < 3.1.74.0 Yes
Application cisco firepower_threat_defense_software < 7.0.6.2 Yes
Application cisco firepower_threat_defense_software < 7.2.6 Yes
Application cisco firepower_threat_defense_software < 7.4.2 Yes
Application cisco firepower_threat_defense_software 7.1.0 Yes
Application cisco firepower_threat_defense_software 7.3.0 Yes

References