A vulnerability in the TCP/IP traffic handling function...
High severity
Unreviewed
Published
Oct 23, 2024
to the GitHub Advisory Database
•
Updated Oct 23, 2024
Description
Published by the National Vulnerability Database
Oct 23, 2024
Published to the GitHub Advisory Database
Oct 23, 2024
Last updated
Oct 23, 2024
A vulnerability in the TCP/IP traffic handling function of the Snort Detection Engine of Cisco Firepower Threat Defense (FTD) Software and Cisco FirePOWER Services could allow an unauthenticated, remote attacker to cause legitimate network traffic to be dropped, resulting in a denial of service (DoS) condition.
This vulnerability is due to the improper handling of TCP/IP network traffic. An attacker could exploit this vulnerability by sending a large amount of TCP/IP network traffic through the affected device. A successful exploit could allow the attacker to cause the Cisco FTD device to drop network traffic, resulting in a DoS condition. The affected device must be rebooted to resolve the DoS condition.
References