CVE-2026-20007
Received Received - Intake
Logic Flaw in Cisco Snort Enables Remote Traffic Bypass

Publication date: 2026-03-04

Last updated on: 2026-03-04

Assigner: Cisco Systems, Inc.

Description
A vulnerability in the Snort 2 and Snort 3 deep packet inspection of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured Snort rules and allow traffic onto the network that should have been dropped. This vulnerability is due to a logic error in the integration of the Snort Engine rules with Cisco Secure FTD Software that could allow different Snort rules to be hit when deep inspection of the packet is performed for the inner and outer connections. An attacker could exploit this vulnerability by sending crafted traffic to a targeted device that would hit configured Snort rules. A successful exploit could allow the attacker to send traffic to a network where it should have been denied.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-04
Last Modified
2026-03-04
Generated
2026-05-06
AI Q&A
2026-03-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
cisco secure_firewall_threat_defense 2
cisco secure_firewall_threat_defense 3
cisco secure_firewall_threat_defense *
cisco snort 2
cisco snort 3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-20007 is a medium-severity vulnerability in Cisco Secure Firewall Threat Defense (FTD) Software affecting the Snort 2 and Snort 3 deep packet inspection engines.

The vulnerability arises from a logic error in how Snort Engine rules are integrated with Cisco Secure FTD, causing inconsistent rule matching between the inspection of inner and outer packet connections.

This flaw allows an unauthenticated, remote attacker to bypass configured Snort rules by sending specially crafted traffic that triggers different Snort rules during deep inspection, enabling unauthorized traffic to pass through the firewall that should have been blocked.


How can this vulnerability impact me? :

This vulnerability could allow an unauthenticated, remote attacker to bypass configured Snort rules on Cisco Secure Firewall Threat Defense devices.

As a result, traffic that should have been denied by the firewall could be allowed onto the network.

This could lead to unauthorized access or exposure of the network to potentially malicious traffic.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Cisco provides a Software Checker tool to help customers identify affected versions of Cisco Secure Firewall Threat Defense (FTD) Software that are vulnerable to CVE-2026-20007.

To detect if your system is vulnerable, you should use this Software Checker tool to verify the version of your Cisco Secure FTD Software and determine if it includes the vulnerable Snort 2 or Snort 3 deep packet inspection engines.

Additionally, Cisco provides instructions and resources for determining the Snort version and software compatibility, which can help in assessing exposure to this vulnerability.

No specific network or system commands are provided in the available resources for detecting this vulnerability directly on your network traffic.


What immediate steps should I take to mitigate this vulnerability?

There are no workarounds available for this vulnerability.

The immediate and recommended mitigation step is to upgrade Cisco Secure Firewall Threat Defense (FTD) Software to the fixed versions specified in the Cisco advisory.

Customers should consult Cisco’s upgrade guides and follow the instructions to apply the fixed software releases to fully remediate the issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart