|  |  | 
closedb();
?>
| Podatność CVE-2021-1236Publikacja: 2021-01-13
 
 
	Typ:
		| Opis: |  
		| Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. |  
 CWE-670(Always-Incorrect Control Flow Implementation)
				 CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)| Ogólna skala CVSS | Znaczenie | Łatwość wykorzystania |  
							| 5/10 | 2.9/10 | 10/10 | 
 
						| Wymagany dostęp | Złożoność ataku | Autoryzacja |  
						| Zdalny | Niska | Nie wymagana |  
						| Wpływ na poufność | Wpływ na integralność | Wpływ na dostępność |  
						| Brak | Częściowy | Brak | 
 
|  Referencje: |  
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq | 
 |  |  |  Copyright 2025, cxsecurity.com
  
     |  |  |