// For flags

CVE-2021-40114

Multiple Cisco Products Snort Memory Leak Denial of Service Vulnerability

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload.

Múltiples productos de Cisco están afectados por una vulnerabilidad en la forma en que el motor de detección Snort procesa el tráfico ICMP que podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a una administración inapropiada de los recursos de memoria mientras el motor de detección Snort procesa paquetes ICMP. Un atacante podría explotar esta vulnerabilidad mediante el envío de una serie de paquetes ICMP mediante un dispositivo afectado. Una explotación con éxito podría permitir al atacante agotar los recursos del dispositivo afectado, causando la recarga del mismo

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2021-08-25 CVE Reserved
  • 2021-10-27 CVE Published
  • 2024-07-12 EPSS Updated
  • 2024-11-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-401: Missing Release of Memory after Effective Lifetime
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
2.9.14.0
Search vendor "Cisco" for product "Firepower Management Center" and version "2.9.14.0"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
2.9.15
Search vendor "Cisco" for product "Firepower Management Center" and version "2.9.15"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
2.9.16
Search vendor "Cisco" for product "Firepower Management Center" and version "2.9.16"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Management Center
Search vendor "Cisco" for product "Firepower Management Center"
2.9.17
Search vendor "Cisco" for product "Firepower Management Center" and version "2.9.17"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
< 6.4.0.12
Search vendor "Cisco" for product "Firepower Threat Defense" and version " < 6.4.0.12"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
>= 6.5.0 < 6.6.3
Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.5.0 < 6.6.3"
-
Affected
Cisco
Search vendor "Cisco"
Firepower Threat Defense
Search vendor "Cisco" for product "Firepower Threat Defense"
>= 6.7.0 < 6.7.0.2
Search vendor "Cisco" for product "Firepower Threat Defense" and version " >= 6.7.0 < 6.7.0.2"
-
Affected
Cisco
Search vendor "Cisco"
Unified Threat Defense
Search vendor "Cisco" for product "Unified Threat Defense"
>= 16.12 < 16.12.6
Search vendor "Cisco" for product "Unified Threat Defense" and version " >= 16.12 < 16.12.6"
-
Affected
Cisco
Search vendor "Cisco"
Unified Threat Defense
Search vendor "Cisco" for product "Unified Threat Defense"
>= 17.3 < 17.3.4a
Search vendor "Cisco" for product "Unified Threat Defense" and version " >= 17.3 < 17.3.4a"
-
Affected
Cisco
Search vendor "Cisco"
Unified Threat Defense
Search vendor "Cisco" for product "Unified Threat Defense"
>= 17.4 < 17.4.2
Search vendor "Cisco" for product "Unified Threat Defense" and version " >= 17.4 < 17.4.2"
-
Affected
Snort
Search vendor "Snort"
Snort
Search vendor "Snort" for product "Snort"
>= 2.0.0 < 2.9.18
Search vendor "Snort" for product "Snort" and version " >= 2.0.0 < 2.9.18"
-
Affected