Home

Description

Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Decoder that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart. This vulnerability is due to a lack of complete error checking when the MIME fields of the HTTP header are parsed. An attacker could exploit this vulnerability by sending crafted HTTP packets through an established connection to be parsed by Snort 3. A successful exploit could allow the attacker to cause a DoS condition when the Snort 3 Detection Engine unexpectedly restarts.

PUBLISHED Reserved 2024-10-10 | Published 2025-10-15 | Updated 2025-10-15 | Assigner cisco




MEDIUM: 5.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L

Problem types

Buffer Access with Incorrect Length Value

Product status

7.3.0
affected

7.3.1
affected

7.3.1.1
affected

7.3.1.2
affected

7.4.0
affected

7.4.1
affected

7.4.1.1
affected

7.4.2
affected

7.4.2.1
affected

7.4.2.2
affected

7.4.2.3
affected

7.4.2.4
affected

7.6.0
affected

7.6.1
affected

7.7.0
affected

3.0.4
affected

3.0.0
affected

3.0.1
affected

3.0.2
affected

3.0.3
affected

3.0.5
affected

3.0.6
affected

3.1.0
affected

3.1.2
affected

3.1.1
affected

3.2.3
affected

3.2.1
affected

3.2.4
affected

3.2.0
affected

3.2.2
affected

4.0.0
affected

4.0.1
affected

4.0.2
affected

4.0.3
affected

4.1.0
affected

4.1.1
affected

4.1.2
affected

4.1.3
affected

4.1.4
affected

4.1.5
affected

4.1.6
affected

4.1.7
affected

4.2.0
affected

4.2.1
affected

4.2.4
affected

4.2.6
affected

4.2.2
affected

4.2.3
affected

4.3.0
affected

4.3.1
affected

4.3.2
affected

4.3.3
affected

4.4.0
affected

4.4.1
affected

4.4.2
affected

4.4.3
affected

5.0.0
affected

5.0.1
affected

5.0.2
affected

5.1.1
affected

5.1.2
affected

5.1.3
affected

5.2.0
affected

5.2.1
affected

Any version
affected

References

sec.cloudapps.cisco.com/...sco-sa-snort3-mime-vulns-tTL8PgVH (cisco-sa-snort3-mime-vulns-tTL8PgVH)

cve.org (CVE-2025-20360)

nvd.nist.gov (CVE-2025-20360)

Download JSON