CVE-2024-20351
high-risk
Published 2024-10-23
A vulnerability in the TCP/IP traffic handling function of the Snort Detection Engine of Cisco Firepower Threat Defense (FTD) Software and Cisco FirePOWER Services could allow an unauthenticated, remote attacker to cause legitimate network traffic to be dropped, resulting in a denial of service (DoS) condition. This vulnerability is due to the improper handling of TCP/IP network traffic. An attacker could exploit this vulnerability by sending a large amount of TCP/IP network traffic through the affected device. A successful exploit could allow the attacker to cause the Cisco FTD device to drop network traffic, resulting in a DoS condition. The affected device must be rebooted to resolve the DoS condition.
Do I need to act?
~
1.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.6/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Firepower Threat Defense Software
Affected Vendors
References (4)
62
/ 100
high-risk
Severity
29/34 · Critical
Exploitability
4/34 · Minimal
Exposure
29/34 · Critical