|  |  | 
closedb();
?>
| Vulnerability CVE-2021-1236Published: 2021-01-13
 
 
	Type:
		| Description: |  
		| Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. |  
 CWE-670(Always-Incorrect Control Flow Implementation)
				 CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)| CVSS Base Score | Impact Subscore | Exploitability Subscore |  
							| 5/10 | 2.9/10 | 10/10 | 
 
						| Exploit range | Attack complexity | Authentication |  
						| Remote | Low | No required |  
						| Confidentiality impact | Integrity impact | Availability impact |  
						| None | Partial | None | 
 
|  References: |  
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq | 
 |  |  |  Copyright 2025, cxsecurity.com
  
     |  |  |