Home

Description

Multiple Cisco products are affected by a vulnerability in the Snort 3 detection engine that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart, resulting in an interruption of packet inspection. This vulnerability is due to incomplete error checking when parsing remote procedure call (RPC) data. An attacker could exploit this vulnerability by sending crafted RPC packets through an established connection to be parsed by Snort 3. A successful exploit could allow the attacker to cause a DoS condition when the Snort 3 Detection Engine unexpectedly restarts.

PUBLISHED Reserved 2025-10-08 | Published 2026-03-04 | Updated 2026-03-04 | Assigner cisco




MEDIUM: 5.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L

Problem types

Uncaught Exception

Product status

Default status
unknown

3.0.0
affected

3.0.2
affected

3.0.3
affected

3.0.1
affected

3.1.0
affected

3.0.4
affected

3.1.1
affected

3.1.2
affected

3.2.0
affected

3.0.5
affected

3.2.1
affected

3.0.6
affected

3.2.2
affected

3.2.3
affected

3.2.4
affected

4.0.0
affected

4.0.1
affected

4.0.2
affected

4.0.3
affected

4.1.0
affected

4.1.1
affected

4.1.2
affected

4.1.3
affected

4.1.4
affected

4.2.0
affected

4.2.1
affected

4.1.5
affected

4.2.2
affected

4.2.X
affected

4.2.3
affected

4.2.4
affected

4.2.6
affected

4.1.6
affected

4.3.0
affected

4.3.1
affected

4.3.2
affected

4.3.3
affected

4.4.0
affected

4.4.1
affected

4.4.2
affected

4.4.3
affected

4.1.7
affected

5.0.0
affected

5.0.1
affected

5.0.2
affected

5.1.0
affected

5.1.1
affected

5.1.2
affected

5.1.3
affected

5.2.0
affected

5.2.1
affected

5.3.0
affected

5.3.1
affected

5.3.2
affected

Default status
unknown

7.2.4
affected

7.2.5
affected

7.2.4.1
affected

7.4.0
affected

7.2.5.1
affected

7.4.1
affected

7.2.6
affected

7.4.1.1
affected

7.2.7
affected

7.2.5.2
affected

7.2.8
affected

7.6.0
affected

7.4.2
affected

7.2.8.1
affected

7.4.2.1
affected

7.2.9
affected

7.7.0
affected

7.4.2.2
affected

7.2.10
affected

7.6.1
affected

7.4.2.3
affected

7.6.2
affected

7.7.10
affected

7.6.2.1
affected

7.7.10.1
affected

7.4.2.4
affected

7.2.10.2
affected

7.4.3
affected

Default status
unknown

17.3.1a
affected

17.2.1r
affected

17.3.2
affected

17.4.1a
affected

17.5.1
affected

17.3.3
affected

17.5.1a
affected

17.3.4
affected

17.3.4a
affected

17.4.2
affected

17.4.1b
affected

17.6.1a
affected

17.7.1a
affected

17.6.2
affected

17.8.1a
affected

17.3.5
affected

17.6.3
affected

17.6.3a
affected

17.7.2
affected

17.9.1a
affected

17.6.4
affected

17.10.1a
affected

17.3.6
affected

17.3.7
affected

17.9.2a
affected

17.6.5
affected

17.11.1a
affected

17.9.3a
affected

17.12.1a
affected

17.9.4
affected

17.6.6
affected

17.3.8
affected

17.3.8a
affected

17.6.6a
affected

17.9.4a
affected

17.12.2
affected

17.13.1a
affected

17.9.5a
affected

17.12.3
affected

17.6.7
affected

17.14.1a
affected

17.12.4
affected

17.12.3a
affected

17.15.1a
affected

17.6.8
affected

17.9.6
affected

17.6.8a
affected

17.16.1a
affected

17.9.5e
affected

17.12.4a
affected

17.15.2c
affected

17.9.5f
affected

17.12.4b
affected

17.15.2a
affected

17.12.5
affected

17.17.1
affected

17.12.5a
affected

17.9.7a
affected

17.15.3a
affected

17.15.3
affected

17.12.5b
affected

17.12.5c
affected

17.15.4
affected

17.9.7b
affected

17.18.1
affected

17.18.1a
affected

17.12.6
affected

17.9.8
affected

17.15.4c
affected

17.12.5d
affected

17.18.2
affected

References

sec.cloudapps.cisco.com/...isco-sa-snort3-multi-dos-XFWkWSwz (cisco-sa-snort3-multi-dos-XFWkWSwz)

cve.org (CVE-2026-20068)

nvd.nist.gov (CVE-2026-20068)

Download JSON