Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter. This vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device.
2024-10-23T17:15:18.703
2025-08-11T14:23:43.827
Analyzed
CVSSv3.1: 5.8 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | snort | < 3.1.74.0 | Yes |
Application | cisco | firepower_threat_defense_software | < 7.0.6.2 | Yes |
Application | cisco | firepower_threat_defense_software | < 7.2.6 | Yes |
Application | cisco | firepower_threat_defense_software | < 7.4.2 | Yes |
Application | cisco | firepower_threat_defense_software | 7.1.0 | Yes |
Application | cisco | firepower_threat_defense_software | 7.3.0 | Yes |