cisco firepower-management-center CVE-2021-1223 in Cisco and Snort Products
Published on January 13, 2021

Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability

product logo product logo
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of an HTTP range header. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.

Vendor Advisory Vendor Advisory NVD

Weakness Type

Protection Mechanism Failure

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. This weakness covers three distinct situations. A "missing" protection mechanism occurs when the application does not define any mechanism against a certain class of attack. An "insufficient" protection mechanism might provide some defenses - for example, against the most common attacks - but it does not protect against everything that is intended. Finally, an "ignored" mechanism occurs when a mechanism is available and in active use within the product, but the developer has not applied it in some code path.


Products Associated with CVE-2021-1223

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-1223 are published in these products:

 
 
 
 
 

Affected Versions

Cisco Firepower Threat Defense Software Version n/a is affected by CVE-2021-1223

Exploit Probability

EPSS
0.41%
Percentile
60.74%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.