Home

Description

A vulnerability in the packet inspection functionality of the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to incorrect processing of traffic that is inspected by an affected device. An attacker could exploit this vulnerability by sending crafted traffic through the affected device. A successful exploit could allow the attacker to cause the affected device to enter an infinite loop while inspecting traffic, resulting in a DoS condition. The system watchdog will restart the Snort process automatically.

PUBLISHED Reserved 2024-10-10 | Published 2025-08-14 | Updated 2025-08-14 | Assigner cisco




HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Problem types

Loop with Unreachable Exit Condition ('Infinite Loop')

Product status

Default status
unknown

7.1.0
affected

7.1.0.1
affected

7.2.0
affected

7.1.0.2
affected

7.2.0.1
affected

7.2.1
affected

7.3.0
affected

7.2.2
affected

7.2.3
affected

7.3.1
affected

7.1.0.3
affected

7.2.4
affected

7.2.5
affected

7.2.4.1
affected

7.3.1.1
affected

7.4.0
affected

7.2.5.1
affected

7.4.1
affected

7.2.6
affected

7.4.1.1
affected

7.2.7
affected

7.2.5.2
affected

7.3.1.2
affected

7.2.8
affected

7.6.0
affected

7.4.2
affected

7.2.8.1
affected

7.4.2.1
affected

7.2.9
affected

References

sec.cloudapps.cisco.com/...dvisory/cisco-sa-ftd-dos-SvKhtjgt (cisco-sa-ftd-dos-SvKhtjgt)

cve.org (CVE-2025-20217)

nvd.nist.gov (CVE-2025-20217)

Download JSON