CVE-2025-20359
BaseFortify
Publication date: 2025-10-15
Last updated on: 2025-10-16
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | snort | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-127 | The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations prior to the targeted buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Snort 3 HTTP Decoder used by multiple Cisco products. It is caused by an error in buffer handling logic when parsing MIME fields in HTTP headers, leading to a buffer under-read. An unauthenticated remote attacker can exploit this by sending specially crafted HTTP packets, potentially causing the Snort 3 Detection Engine to crash or disclose sensitive information from the Snort 3 data stream.
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to two main impacts: a denial of service (DoS) condition by causing the Snort 3 Detection Engine to unexpectedly restart, disrupting network security monitoring; or disclosure of sensitive information from the Snort 3 data stream, which could expose data that is not valid connection data.