Improper Handling of Unexpected Data Type in Cisco Firewall Threat Defense (FTD) and Snort - CVE-2021-40116

 

Improper Handling of Unexpected Data Type in Cisco Firewall Threat Defense (FTD) and Snort - CVE-2021-40116

Published: October 29, 2021


Vulnerability identifier: #VU57800
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2021-40116
CWE-ID: CWE-241
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Cisco Firewall Threat Defense (FTD)
Snort
Software vendor:
Cisco Systems, Inc
Sourcefire

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. A remote attacker can send a specially crafted IP packet and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.

External links