← Back to CVEs
CVE-2024-20342
MEDIUM5.8
Description
Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter. This vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device.
CVE Details
CVSS v3.1 Score5.8
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/23/2024
Last Modified8/11/2025
Sourcenvd
Honeypot Sightings0
Affected Products
cisco:firepower_threat_defense_softwarecisco:snort
Weaknesses (CWE)
CWE-1025
References
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.