Home

Description

A vulnerability in the memory management handling for the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart. This vulnerability is due to a logic error in memory management when a device is performing Snort 3 SSL packet inspection. An attacker could exploit this vulnerability by sending crafted SSL packets through an established connection to be parsed by the Snort 3 Detection Engine. A successful exploit could allow the attacker to cause a denial of service (DoS) condition when the Snort 3 Detection Engine unexpectedly restarts.

PUBLISHED Reserved 2025-10-08 | Published 2026-03-04 | Updated 2026-03-04 | Assigner cisco




MEDIUM: 5.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L

Problem types

Access of Memory Location After End of Buffer

Product status

Default status
unknown

7.4.0
affected

7.4.1
affected

7.4.1.1
affected

7.6.0
affected

7.4.2
affected

7.4.2.1
affected

References

sec.cloudapps.cisco.com/...y/cisco-sa-ftd-snort3ssl-FBEKYXpH (cisco-sa-ftd-snort3ssl-FBEKYXpH)

cve.org (CVE-2026-20052)

nvd.nist.gov (CVE-2026-20052)

Download JSON