// For flags

CVE-2021-1285

Multiple Cisco Products SNORT Ethernet Frame Decoder Denial of Service Vulnerability

Severity Score

7.4
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Multiple Cisco products are affected by a vulnerability in the Ethernet Frame Decoder of the Snort detection engine that could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.
The vulnerability is due to improper handling of error conditions when processing Ethernet frames. An attacker could exploit this vulnerability by sending malicious Ethernet frames through an affected device. A successful exploit could allow the attacker to exhaust disk space on the affected device, which could result in administrators being unable to log in to the device or the device being unable to boot up correctly.Note: Manual intervention is required to recover from this situation. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Varios productos de Cisco se ven afectados por una vulnerabilidad en el decodificador de tramas Ethernet del motor de detección Snort que podría permitir que un atacante adyacente no autenticado provoque una condición de denegación de servicio (DoS). La vulnerabilidad se debe a un manejo inadecuado de las condiciones de error al procesar tramas Ethernet. Un atacante podría aprovechar esta vulnerabilidad enviando tramas Ethernet maliciosas a través de un dispositivo afectado. Una explotación exitosa podría permitir que el atacante agote el espacio en disco en el dispositivo afectado, lo que podría provocar que los administradores no puedan iniciar sesión en el dispositivo o que el dispositivo no pueda iniciarse correctamente. Nota: Se requiere intervención manual para recuperarse de esta situación. Se recomienda a los clientes que se comuniquen con el Centro de asistencia técnica (TAC) de Cisco para obtener ayuda para recuperar un dispositivo en esta condición. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2020-11-13 CVE Reserved
  • 2024-11-18 CVE Published
  • 2024-11-18 CVE Updated
  • ---------- EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
16.12.3
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "16.12.3"
en
Affected
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
16.12.4
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "16.12.4"
en
Affected
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
17.3.1
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "17.3.1"
en
Affected
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
16.6.6
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "16.6.6"
en
Affected
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
16.12.2
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "16.12.2"
en
Affected
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
16.6.5
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "16.6.5"
en
Affected
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
17.2.1
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "17.2.1"
en
Affected
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
17.1.1
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "17.1.1"
en
Affected
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
16.6.7
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "16.6.7"
en
Affected
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
16.6.1
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "16.6.1"
en
Affected
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
16.12.1
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "16.12.1"
en
Affected
Cisco
Search vendor "Cisco"
Cisco UTD SNORT IPS Engine Software
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software"
17.3.2
Search vendor "Cisco" for product "Cisco UTD SNORT IPS Engine Software" and version "17.3.2"
en
Affected