Home

Description

Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Decoder that could allow an unauthenticated, remote attacker to cause the disclosure of possible sensitive data or cause the Snort 3 Detection Engine to crash. This vulnerability is due to an error in the logic of buffer handling when the MIME fields of the HTTP header are parsed. This can result in a buffer under-read. An attacker could exploit this vulnerability by sending crafted HTTP packets through an established connection that is parsed by Snort 3. A successful exploit could allow the attacker to induce one of two possible outcomes: the unexpected restarting of the Snort 3 Detection Engine, which could cause a denial of service (DoS) condition, or information disclosure of sensitive information in the Snort 3 data stream. Due to the under-read condition, it is possible that sensitive information that is not valid connection data could be returned.

PUBLISHED Reserved 2024-10-10 | Published 2025-10-15 | Updated 2025-10-15 | Assigner cisco




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

Problem types

Buffer Under-read

Product status

Default status
unknown

3.0.0
affected

3.0.2
affected

3.0.3
affected

3.0.1
affected

3.1.0
affected

3.0.4
affected

3.1.1
affected

3.1.2
affected

3.2.0
affected

3.0.5
affected

3.2.1
affected

3.0.6
affected

3.2.2
affected

3.2.3
affected

3.2.4
affected

4.0.0
affected

4.0.1
affected

4.0.2
affected

4.0.3
affected

4.1.0
affected

4.1.1
affected

4.1.2
affected

4.1.3
affected

4.1.4
affected

4.2.0
affected

4.2.1
affected

4.1.5
affected

4.2.2
affected

4.2.X
affected

4.2.3
affected

4.2.4
affected

4.2.6
affected

4.1.6
affected

4.3.0
affected

4.3.1
affected

4.3.2
affected

4.3.3
affected

4.4.0
affected

4.4.1
affected

4.4.2
affected

4.4.3
affected

4.1.7
affected

5.0.0
affected

5.0.1
affected

5.0.2
affected

5.1.0
affected

5.1.1
affected

5.1.2
affected

5.1.3
affected

5.2.0
affected

5.2.1
affected

Default status
unknown

7.4.1
affected

7.4.1.1
affected

7.6.0
affected

7.4.2
affected

7.4.2.1
affected

7.7.0
affected

7.4.2.2
affected

7.6.1
affected

7.4.2.3
affected

7.4.2.4
affected

Default status
unknown

3.17.1S
affected

16.12.3
affected

16.12.4
affected

17.3.1a
affected

16.6.6
affected

16.12.2
affected

3.17.0S
affected

16.6.5
affected

17.2.1r
affected

17.1.1
affected

16.6.7a
affected

16.6.1
affected

16.12.1a
affected

17.3.2
affected

17.4.1a
affected

16.12.5
affected

17.5.1
affected

16.6.9
affected

17.3.3
affected

17.5.1a
affected

17.3.4
affected

17.3.4a
affected

17.4.2
affected

17.4.1b
affected

17.6.1a
affected

16.6.10
affected

17.7.1a
affected

16.12.6
affected

17.6.2
affected

17.8.1a
affected

16.12.7
affected

17.3.5
affected

17.6.3
affected

17.6.3a
affected

17.7.2
affected

17.9.1a
affected

17.6.4
affected

17.3.6
affected

16.12.8
affected

17.3.7
affected

17.9.2a
affected

17.6.5
affected

17.11.1a
affected

17.12.1a
affected

17.6.6
affected

17.3.8
affected

17.3.8a
affected

17.6.6a
affected

17.12.2
affected

17.12.3
affected

17.6.7
affected

17.12.3a
affected

17.12.4
affected

17.6.8
affected

17.6.8a
affected

17.12.4a
affected

17.15.2c
affected

17.12.4b
affected

17.15.2a
affected

17.12.5
affected

17.15.3a
affected

17.15.3
affected

17.12.5b
affected

17.15.4
affected

References

sec.cloudapps.cisco.com/...sco-sa-snort3-mime-vulns-tTL8PgVH (cisco-sa-snort3-mime-vulns-tTL8PgVH)

cve.org (CVE-2025-20359)

nvd.nist.gov (CVE-2025-20359)

Download JSON