cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-20685,https://securityvulnerability.io/vulnerability/CVE-2022-20685,Cisco Snort Detection Engine Vulnerability Could Lead to DoS Conditions,"A vulnerability exists within the Modbus preprocessor of the Snort detection engine which could enable an unauthenticated remote attacker to exploit the device, resulting in a denial of service condition. The root cause lies in an integer overflow that occurs when the system processes Modbus traffic. By sending specially crafted Modbus messages, an attacker can induce the Snort process to become unresponsive, leading to a halt in traffic inspection. Cisco has issued software updates addressing this vulnerability, with no applicable workarounds available.",Cisco,"Cisco Cyber Vision,Cisco Firepower Threat Defense Software,Cisco Utd Snort Ips Engine Software",7.5,HIGH,0.0004299999854993075,false,,false,false,true,2025-01-27T18:15:04.000Z,,false,false,,2024-11-15T15:36:31.261Z,0 CVE-2023-20071,https://securityvulnerability.io/vulnerability/CVE-2023-20071,Vulnerability in Snort Detection Engine Affects Cisco Products,"A vulnerability exists within the FTP module of Cisco's Snort detection engine, which enables unauthenticated, remote attackers to potentially bypass established security policies on affected systems. By sending specifically crafted FTP traffic, attackers can exploit this flaw to evade FTP inspections and potentially deliver malicious payloads. This poses a significant risk to network integrity, allowing unauthorized access and potentially harmful activities.",Cisco,"Cisco Firepower Threat Defense Software,Cisco Umbrella Insights Virtual Appliance,Cisco Cyber Vision,Cisco UTD SNORT IPS Engine Software",5.8,MEDIUM,0.0009500000160187483,false,,false,false,false,,,false,false,,2023-11-01T18:15:00.000Z,0 CVE-2022-20922,https://securityvulnerability.io/vulnerability/CVE-2022-20922,Multiple Vulnerabilities in Cisco's Snort Detection Engine Affecting SMB2 Traffic,"Multiple vulnerabilities within the Server Message Block Version 2 (SMB2) processing capabilities of Cisco's Snort detection engine could be exploited by an unauthenticated remote attacker. By sending a high volume of specific SMB2 packets, attackers can disrupt the service by forcing the Snort process to reload, leading to a denial of service (DoS) condition. Furthermore, if the Snort preserve-connection option is enabled—default for Snort 3—attackers may also bypass existing security policies, allowing malicious payloads to infiltrate the protected network.",Cisco,"Cisco Firepower Threat Defense Software,Cisco Umbrella Insights Virtual Appliance,Cisco Cyber Vision",5.8,MEDIUM,0.001290000043809414,false,,false,false,true,2024-08-03T03:15:47.000Z,,false,false,,2022-11-15T21:15:00.000Z,0 CVE-2022-20943,https://securityvulnerability.io/vulnerability/CVE-2022-20943,Vulnerability in the Snort Detection Engine for Cisco Products,"Multiple security vulnerabilities exist within the Snort detection engine of various Cisco products, specifically when handling Server Message Block Version 2 (SMB2) traffic. These vulnerabilities stem from the ineffective management of system resources, allowing unauthenticated attackers to exploit the processing of SMB2 packets. A successful exploitation could lead to a denial of service (DoS), as the Snort process may reload under certain conditions. Furthermore, if the 'preserve-connection' option is enabled—which is the default setting—attackers may bypass configured security policies and inject malicious payloads into the protected network. Note that this affects products only when configured with Snort 3; those using Snort 2 remain unaffected. For further details, refer to Cisco's advisory.",Cisco,"Cisco Firepower Threat Defense Software,Cisco Cyber Vision",5.8,MEDIUM,0.001290000043809414,false,,false,false,true,2024-08-03T03:15:48.000Z,,false,false,,2022-11-15T21:15:00.000Z,0 CVE-2020-3448,https://securityvulnerability.io/vulnerability/CVE-2020-3448,Cisco Cyber Vision Center Software Access Control Bypass Vulnerability,"A vulnerability in an access control mechanism of Cisco Cyber Vision Center Software could allow an unauthenticated, remote attacker to bypass authentication and access internal services that are running on an affected device. The vulnerability is due to insufficient enforcement of access control in the software. An attacker could exploit this vulnerability by directly accessing the internal services of an affected device. A successful exploit could allow an attacker to impact monitoring of sensors that are managed by the software.",Cisco,Cisco Cyber Vision,5.8,MEDIUM,0.001290000043809414,false,,false,false,true,2024-08-04T08:16:41.000Z,,false,false,,2020-08-17T18:15:00.000Z,0