Cisco Firepower Threat Defense Software SMB Protocol Snort 3 Detection Engine Bypass and DoS (cisco-sa-ftd-smbsnort3-dos-pfOjOYUV)

medium Nessus Plugin ID 264480

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco Firepower Threat Defense (FTD) Software is affected by a vulnerability.

- A vulnerability in the interaction between the Server Message Block (SMB) protocol preprocessor and the Snort 3 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error-checking when the Snort 3 detection engine is processing SMB traffic. An attacker could exploit this vulnerability by sending a crafted SMB packet stream through an affected device. A successful exploit could allow the attacker to cause the Snort process to reload, resulting in a DoS condition. (CVE-2023-20270)

Please see the included Cisco BID and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwe19286

See Also

http://www.nessus.org/u?5578d47a

Plugin Details

Severity: Medium

ID: 264480

File Name: cisco-sa-ftd-smbsnort3-dos-pfOjOYUV.nasl

Version: 1.1

Type: local

Family: CISCO

Published: 9/10/2025

Updated: 9/10/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2023-20270

CVSS v3

Risk Factor: Medium

Base Score: 5.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L

Vulnerability Information

CPE: cpe:/a:cisco:firepower_threat_defense

Required KB Items: installed_sw/Cisco Firepower Threat Defense

Patch Publication Date: 11/1/2023

Vulnerability Publication Date: 11/1/2023

Reference Information

CVE: CVE-2023-20270