Buffer Underread in Cisco Snort 3 HTTP Decoder Causes DoS & Info Disclosure
CVE-2025-20359 Published on October 15, 2025
Multiple Cisco Products Snort 3 MIME Information Disclosure or Denial of Service Vulnerability
Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Decoder that could allow an unauthenticated, remote attacker to cause the disclosure of possible sensitive data or cause the Snort 3 Detection Engine to crash.
This vulnerability is due to an error in the logic of buffer handling when the MIME fields of the HTTP header are parsed. This can result in a buffer under-read. An attacker could exploit this vulnerability by sending crafted HTTP packets through an established connection that is parsed by Snort 3. A successful exploit could allow the attacker to induce one of two possible outcomes: the unexpected restarting of the Snort 3 Detection Engine, which could cause a denial of service (DoS) condition, or information disclosure of sensitive information in the Snort 3 data stream. Due to the under-read condition, it is possible that sensitive information that is not valid connection data could be returned.
Vulnerability Analysis
CVE-2025-20359 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity, and a small impact on availability.
Weakness Type
Buffer Under-read
The software reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations prior to the targeted buffer. This typically occurs when the pointer or its index is decremented to a position before the buffer, when pointer arithmetic results in a position before the beginning of the valid memory location, or when a negative index is used. This may result in exposure of sensitive information or possibly a crash.
Products Associated with CVE-2025-20359
Want to know whenever a new CVE is published for Cisco Cyber Vision? stack.watch will email you.
Affected Versions
Cisco Cyber Vision:- Version 3.0.0 is affected.
- Version 3.0.2 is affected.
- Version 3.0.3 is affected.
- Version 3.0.1 is affected.
- Version 3.1.0 is affected.
- Version 3.0.4 is affected.
- Version 3.1.1 is affected.
- Version 3.1.2 is affected.
- Version 3.2.0 is affected.
- Version 3.0.5 is affected.
- Version 3.2.1 is affected.
- Version 3.0.6 is affected.
- Version 3.2.2 is affected.
- Version 3.2.3 is affected.
- Version 3.2.4 is affected.
- Version 4.0.0 is affected.
- Version 4.0.1 is affected.
- Version 4.0.2 is affected.
- Version 4.0.3 is affected.
- Version 4.1.0 is affected.
- Version 4.1.1 is affected.
- Version 4.1.2 is affected.
- Version 4.1.3 is affected.
- Version 4.1.4 is affected.
- Version 4.2.0 is affected.
- Version 4.2.1 is affected.
- Version 4.1.5 is affected.
- Version 4.2.2 is affected.
- Version 4.2.X is affected.
- Version 4.2.3 is affected.
- Version 4.2.4 is affected.
- Version 4.2.6 is affected.
- Version 4.1.6 is affected.
- Version 4.3.0 is affected.
- Version 4.3.1 is affected.
- Version 4.3.2 is affected.
- Version 4.3.3 is affected.
- Version 4.4.0 is affected.
- Version 4.4.1 is affected.
- Version 4.4.2 is affected.
- Version 4.4.3 is affected.
- Version 4.1.7 is affected.
- Version 5.0.0 is affected.
- Version 5.0.1 is affected.
- Version 5.0.2 is affected.
- Version 5.1.0 is affected.
- Version 5.1.1 is affected.
- Version 5.1.2 is affected.
- Version 5.1.3 is affected.
- Version 5.2.0 is affected.
- Version 5.2.1 is affected.
- Version 7.4.1 is affected.
- Version 7.4.1.1 is affected.
- Version 7.6.0 is affected.
- Version 7.4.2 is affected.
- Version 7.4.2.1 is affected.
- Version 7.7.0 is affected.
- Version 7.4.2.2 is affected.
- Version 7.6.1 is affected.
- Version 7.4.2.3 is affected.
- Version 7.4.2.4 is affected.
- Version 3.17.1S is affected.
- Version 16.12.3 is affected.
- Version 16.12.4 is affected.
- Version 17.3.1a is affected.
- Version 16.6.6 is affected.
- Version 16.12.2 is affected.
- Version 3.17.0S is affected.
- Version 16.6.5 is affected.
- Version 17.2.1r is affected.
- Version 17.1.1 is affected.
- Version 16.6.7a is affected.
- Version 16.6.1 is affected.
- Version 16.12.1a is affected.
- Version 17.3.2 is affected.
- Version 17.4.1a is affected.
- Version 16.12.5 is affected.
- Version 17.5.1 is affected.
- Version 16.6.9 is affected.
- Version 17.3.3 is affected.
- Version 17.5.1a is affected.
- Version 17.3.4 is affected.
- Version 17.3.4a is affected.
- Version 17.4.2 is affected.
- Version 17.4.1b is affected.
- Version 17.6.1a is affected.
- Version 16.6.10 is affected.
- Version 17.7.1a is affected.
- Version 16.12.6 is affected.
- Version 17.6.2 is affected.
- Version 17.8.1a is affected.
- Version 16.12.7 is affected.
- Version 17.3.5 is affected.
- Version 17.6.3 is affected.
- Version 17.6.3a is affected.
- Version 17.7.2 is affected.
- Version 17.9.1a is affected.
- Version 17.6.4 is affected.
- Version 17.3.6 is affected.
- Version 16.12.8 is affected.
- Version 17.3.7 is affected.
- Version 17.9.2a is affected.
- Version 17.6.5 is affected.
- Version 17.11.1a is affected.
- Version 17.12.1a is affected.
- Version 17.6.6 is affected.
- Version 17.3.8 is affected.
- Version 17.3.8a is affected.
- Version 17.6.6a is affected.
- Version 17.12.2 is affected.
- Version 17.12.3 is affected.
- Version 17.6.7 is affected.
- Version 17.12.3a is affected.
- Version 17.12.4 is affected.
- Version 17.6.8 is affected.
- Version 17.6.8a is affected.
- Version 17.12.4a is affected.
- Version 17.15.2c is affected.
- Version 17.12.4b is affected.
- Version 17.15.2a is affected.
- Version 17.12.5 is affected.
- Version 17.15.3a is affected.
- Version 17.15.3 is affected.
- Version 17.12.5b is affected.
- Version 17.15.4 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.