CVE-2021-1236
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/01/2021
Last modified:
26/11/2024
Description
Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* | 17.4.1 (excluding) | |
| cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq
- https://www.debian.org/security/2023/dsa-5354
- https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq
- https://www.debian.org/security/2023/dsa-5354



