A vulnerability in the packet inspection functionality of...
High severity
Unreviewed
Published
Aug 14, 2025
to the GitHub Advisory Database
•
Updated Aug 14, 2025
Description
Published by the National Vulnerability Database
Aug 14, 2025
Published to the GitHub Advisory Database
Aug 14, 2025
Last updated
Aug 14, 2025
A vulnerability in the packet inspection functionality of the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to incorrect processing of traffic that is inspected by an affected device. An attacker could exploit this vulnerability by sending crafted traffic through the affected device. A successful exploit could allow the attacker to cause the affected device to enter an infinite loop while inspecting traffic, resulting in a DoS condition. The system watchdog will restart the Snort process automatically.
References