Lucene search

K
ciscoCiscoCISCO-SA-SNORT-TFO-BYPASS-MMZZRTES
HistoryJan 13, 2021 - 4:00 p.m.

Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability

2021-01-1316:00:00
tools.cisco.com
31

0.002 Low

EPSS

Percentile

57.3%

Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP.

The vulnerability is due to incorrect detection of the HTTP payload if it is contained at least partially within the TFO connection handshake. An attacker could exploit this vulnerability by sending crafted TFO packets with an HTTP payload through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.

Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes”]

Affected configurations

Vulners
Node
ciscofirepower_threat_defense_softwareMatch6.4
OR
ciscofirepowerMatchany
OR
ciscoips_sensor_softwareMatchany
OR
ciscofirepower_threat_defense_softwareMatch6.4.0.8
OR
ciscofirepower_threat_defense_softwareMatch2100_series
OR
ciscoips_sensor_softwareMatchany
OR
ciscofirepower_threat_defense_softwareMatch2100_series

0.002 Low

EPSS

Percentile

57.3%