A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco cyber Vision Cisco firepower Threat Defense Cisco unified Threat Defense Snort Intrusion Prevention System Engine |
|
CPEs | cpe:2.3:a:cisco:cyber_vision:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.0.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.0.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:4.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.10:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.11:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.12:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.13:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.14:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.15:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.16:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.17:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.18:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.9:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.1a:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.5:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.6:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.10:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.5:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.6:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.7a:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.9:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.1.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.2.1r:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.3.1a:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.3.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.3.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.3.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.3.4a:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.4.1a:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.4.1b:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.4.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.5.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.5.1a:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.6.1a:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.7.1a:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:3.17.0s:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:3.17.1s:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:denali-16.3.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:denali-16.3.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:denali-16.3.5:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:denali-16.3.7:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:denali-16.3.9:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:everest-16.6.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:everest-16.6.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:everest-16.6.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.5:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.6:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.7:*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.8:*:*:*:*:*:*:* |
|
Vendors & Products |
Cisco
Cisco cyber Vision Cisco firepower Threat Defense Cisco unified Threat Defense Snort Intrusion Prevention System Engine |
Mon, 27 Jan 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 15 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. | |
Title | Multiple Cisco Products Snort Modbus Denial of Service Vulnerability | |
Weaknesses | CWE-190 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published: 2024-11-15T15:36:31.261Z
Updated: 2025-01-27T17:48:32.910Z
Reserved: 2021-11-02T13:28:29.055Z
Link: CVE-2022-20685

Updated: 2025-01-27T17:48:07.841Z

Status : Analyzed
Published: 2024-11-15T16:15:21.910
Modified: 2025-06-24T14:47:25.657
Link: CVE-2022-20685

No data.