Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-20351", "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "state": "PUBLISHED", "assignerShortName": "cisco", "dateReserved": "2023-11-08T15:08:07.647Z", "datePublished": "2024-10-23T17:09:35.988Z", "dateUpdated": "2024-10-24T15:06:48.437Z"}, "containers": {"cna": {"title": "Cisco Firepower Threat Defense Software Snort Firewall Denial of Service Vulnerability", "metrics": [{"format": "cvssV3_1", "cvssV3_1": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "baseScore": 8.6, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}}], "descriptions": [{"lang": "en", "value": "A vulnerability in the TCP/IP traffic handling function of the Snort Detection Engine of Cisco Firepower Threat Defense (FTD) Software and Cisco FirePOWER Services could allow an unauthenticated, remote attacker to cause legitimate network traffic to be dropped, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to the improper handling of TCP/IP network traffic. An attacker could exploit this vulnerability by sending a large amount of TCP/IP network traffic through the affected device. A successful exploit could allow the attacker to cause the Cisco FTD device to drop network traffic, resulting in a DoS condition. The affected device must be rebooted to resolve the DoS condition."}], "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-ftd-snort-fw-BCJTZPMu", "name": "cisco-sa-sa-ftd-snort-fw-BCJTZPMu"}, {"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO"}, {"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", "name": "Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication"}, {"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-xss-yjj7ZjVq", "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-xss-yjj7ZjVq"}], "exploits": [{"lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}], "source": {"advisory": "cisco-sa-sa-ftd-snort-fw-BCJTZPMu", "discovery": "EXTERNAL", "defects": ["CSCwh14067"]}, "problemTypes": [{"descriptions": [{"lang": "en", "description": "Uncontrolled Resource Consumption", "type": "cwe", "cweId": "CWE-400"}]}], "affected": [{"vendor": "Cisco", "product": "Cisco Firepower Threat Defense Software", "versions": [{"version": "6.2.3.14", "status": "affected"}, {"version": "6.4.0.1", "status": "affected"}, {"version": "6.2.3.7", "status": "affected"}, {"version": "6.2.3", "status": "affected"}, {"version": "6.4.0.2", "status": "affected"}, {"version": "6.2.3.9", "status": "affected"}, {"version": "6.2.3.1", "status": "affected"}, {"version": "6.2.3.2", "status": "affected"}, {"version": "6.4.0.5", "status": "affected"}, {"version": "6.2.3.10", "status": "affected"}, {"version": "6.4.0", "status": "affected"}, {"version": "6.4.0.3", "status": "affected"}, {"version": "6.2.3.6", "status": "affected"}, {"version": "6.4.0.4", "status": "affected"}, {"version": "6.2.3.15", "status": "affected"}, {"version": "6.2.3.5", "status": "affected"}, {"version": "6.2.3.4", "status": "affected"}, {"version": "6.2.3.3", "status": "affected"}, {"version": "6.2.3.8", "status": "affected"}, {"version": "6.4.0.6", "status": "affected"}, {"version": "6.2.3.11", "status": "affected"}, {"version": "6.2.3.12", "status": "affected"}, {"version": "6.2.3.13", "status": "affected"}, {"version": "6.4.0.7", "status": "affected"}, {"version": "6.4.0.8", "status": "affected"}, {"version": "6.6.0", "status": "affected"}, {"version": "6.4.0.9", "status": "affected"}, {"version": "6.2.3.16", "status": "affected"}, {"version": "6.6.0.1", "status": "affected"}, {"version": "6.6.1", "status": "affected"}, {"version": "6.4.0.10", "status": "affected"}, {"version": "6.7.0", "status": "affected"}, {"version": "6.4.0.11", "status": "affected"}, {"version": "6.6.3", "status": "affected"}, {"version": "6.7.0.1", "status": "affected"}, {"version": "6.6.4", "status": "affected"}, {"version": "6.4.0.12", "status": "affected"}, {"version": "6.7.0.2", "status": "affected"}, {"version": "7.0.0", "status": "affected"}, {"version": "6.2.3.17", "status": "affected"}, {"version": "7.0.0.1", "status": "affected"}, {"version": "6.6.5", "status": "affected"}, {"version": "7.0.1", "status": "affected"}, {"version": "7.1.0", "status": "affected"}, {"version": "6.4.0.13", "status": "affected"}, {"version": "6.6.5.1", "status": "affected"}, {"version": "6.2.3.18", "status": "affected"}, {"version": "7.0.1.1", "status": "affected"}, {"version": "6.7.0.3", "status": "affected"}, {"version": "6.4.0.14", "status": "affected"}, {"version": "7.1.0.1", "status": "affected"}, {"version": "6.6.5.2", "status": "affected"}, {"version": "7.0.2", "status": "affected"}, {"version": "6.4.0.15", "status": "affected"}, {"version": "7.2.0", "status": "affected"}, {"version": "7.0.2.1", "status": "affected"}, {"version": "7.0.3", "status": "affected"}, {"version": "6.6.7", "status": "affected"}, {"version": "7.1.0.2", "status": "affected"}, {"version": "7.2.0.1", "status": "affected"}, {"version": "7.0.4", "status": "affected"}, {"version": "7.2.1", "status": "affected"}, {"version": "7.0.5", "status": "affected"}, {"version": "6.4.0.16", "status": "affected"}, {"version": "7.3.0", "status": "affected"}, {"version": "7.2.2", "status": "affected"}, {"version": "7.2.3", "status": "affected"}, {"version": "6.6.7.1", "status": "affected"}, {"version": "7.3.1", "status": "affected"}, {"version": "7.1.0.3", "status": "affected"}, {"version": "7.2.4", "status": "affected"}, {"version": "7.0.6", "status": "affected"}, {"version": "7.2.5", "status": "affected"}, {"version": "7.2.4.1", "status": "affected"}, {"version": "7.3.1.1", "status": "affected"}, {"version": "7.4.0", "status": "affected"}, {"version": "6.4.0.17", "status": "affected"}, {"version": "7.0.6.1", "status": "affected"}, {"version": "7.2.5.1", "status": "affected"}, {"version": "7.4.1", "status": "affected"}, {"version": "7.4.1.1", "status": "affected"}, {"version": "6.6.7.2", "status": "affected"}, {"version": "6.4.0.18", "status": "affected"}, {"version": "7.2.5.2", "status": "affected"}, {"version": "7.3.1.2", "status": "affected"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco", "dateUpdated": "2024-10-23T17:09:35.988Z"}}, "adp": [{"affected": [{"vendor": "cisco", "product": "firepower_threat_defense_software", "cpes": ["cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "6.2.3", "status": "affected", "lessThanOrEqual": "7.4.1.1", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-23T18:42:44.444145Z", "id": "CVE-2024-20351", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-24T15:06:48.437Z"}}]}}