Cisco Snort
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Cisco Snort.
Recent Cisco Snort Security Advisories
| Advisory | Title | Published |
|---|---|---|
| 2026-01-07 | Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities | January 7, 2026 |
| 2025-10-15 | Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities | October 15, 2025 |
| 2025-08-14 | Cisco Secure Firewall Threat Defense Software Snort 3 Denial of Service Vulnerability | August 14, 2025 |
| 2024-10-23 | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services TCP/IP Traffic with Snort 2 and Snort 3 Denial of Service Vulnerability | October 23, 2024 |
| 2024-10-23 | Cisco Firepower Threat Defense Software Vulnerability Database with Snort Detection Engine Security Policy Bypass and Denial of Service Issue | October 23, 2024 |
| 2024-10-23 | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Appliances TCP UDP Snort 2 and Snort 3 Denial of Service Vulnerability | October 23, 2024 |
| 2024-10-23 | Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability | October 23, 2024 |
| 2024-10-23 | Multiple Cisco Products Snort Rate Filter Bypass Vulnerability | October 23, 2024 |
| 2024-09-25 | Cisco Unified Threat Defense Snort Intrusion Prevention System Engine for Cisco IOS XE Software Security Policy Bypass and Denial of Service Vulnerability | September 25, 2024 |
| 2024-05-22 | Multiple Cisco Products Snort 3 HTTP Intrusion Prevention System Rule Bypass Vulnerability | May 22, 2024 |
By the Year
In 2026 there have been 0 vulnerabilities in Cisco Snort. Snort did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 3 | 8.05 |
| 2023 | 1 | 5.30 |
| 2022 | 2 | 6.15 |
| 2021 | 1 | 7.50 |
It may take a day or so for new Snort vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Cisco Snort Security Vulnerabilities
Snort Modbus Preprocessor Integer Overflow DoS
CVE-2022-20685
7.5 - High
- November 15, 2024
A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Integer Overflow or Wraparound
Cisco Snort Rate Filter Bypass Unauth Remote Attack
CVE-2024-20342
8.6 - High
- October 23, 2024
Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter. This vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device.
CVE-2024-20363 Cisco Snort IPS HTTP Bypass
CVE-2024-20363
- May 22, 2024
Multiple Cisco products are affected by a vulnerability in the Snort Intrusion Prevention System (IPS) rule engine that could allow an unauthenticated, remote attacker to bypass the configured rules on an affected system. This vulnerability is due to incorrect HTTP packet handling. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured IPS rules and allow uninspected traffic onto the network.
Cisco Snort ACL Logic Error Enables Policy Bypass
CVE-2023-20246
5.3 - Medium
- November 01, 2023
Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.
SMB2 DoS & Policy Bypass in Cisco Snort 3 via SMB2
CVE-2022-20943
5.8 - Medium
- November 15, 2022
Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition. Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details ["#details"] section of this advisory for more information. Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected.
Cisco Snort SMB2 DoS and Policy Bypass Vulnerability
CVE-2022-20922
6.5 - Medium
- November 15, 2022
Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition. Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details ["#details"] section of this advisory for more information. Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected.
Multiple Cisco products are affected by a vulnerability in Snort rules
CVE-2021-40116
7.5 - High
- October 27, 2021
Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Cisco Snort or by Cisco? Click the Watch button to subscribe.