CVE-2024-20407
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
23/10/2024
Last modified:
05/08/2025
Description
A vulnerability in the interaction between the TCP Intercept feature and the Snort 3 detection engine on Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies on an affected system. Devices that are configured with Snort 2 are not affected by this vulnerability. <br />
<br />
This vulnerability is due to a logic error when handling embryonic (half-open) TCP connections. An attacker could exploit this vulnerability by sending a crafted traffic pattern through an affected device. A successful exploit could allow unintended traffic to enter the network protected by the affected device.
Impact
Base Score 3.x
5.80
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



