Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks

Posted on August 15, 2025August 15, 2025 By CWS

Essential safety flaw CVE-2025-20217 permits unauthenticated attackers to set off denial-of-service situations in Cisco’s broadly deployed firewall methods

Cisco has disclosed a high-severity vulnerability in its Safe Firewall Menace Protection (FTD) Software program that would enable distant attackers to trigger denial-of-service situations by way of the Snort 3 Detection Engine.

The vulnerability, tracked as CVE-2025-20217 with a CVSS rating of 8.6, was printed on August 14, 2025, as a part of Cisco’s semiannual safety advisory bundle.

The flaw exists within the packet inspection performance of the Snort 3 Detection Engine, a core element liable for analyzing and filtering community site visitors for threats.

The vulnerability stems from incorrect processing of site visitors throughout packet inspection, making a important weak point in gadgets working susceptible variations of Cisco Safe FTD Software program with Snort 3 enabled.

In accordance with Cisco’s advisory, an unauthenticated, distant attacker can exploit this vulnerability by sending crafted site visitors by way of the affected system.

The improper dealing with of those specifically crafted packets causes the affected system to enter an infinite loop whereas inspecting site visitors, leading to a denial-of-service situation.

The vulnerability is classed beneath CWE-835 (Loop with Unreachable Exit Situation), indicating a basic flaw within the detection engine’s logic.

Snort 3 Detection Engine Vulnerability

When efficiently exploited, the vulnerability causes the Snort course of to turn into trapped in an infinite loop, successfully stopping all site visitors inspection till the system watchdog detects the problem and mechanically restarts the Snort course of. This creates a brief however important safety hole throughout which malicious site visitors may go by way of undetected.

The assault requires no authentication and might be executed remotely, making it notably harmful for internet-facing Cisco FTD gadgets. Whereas the system watchdog gives computerized restoration by restarting the Snort course of, the short-term lack of inspection capabilities might be exploited by subtle attackers to launch coordinated assaults.

The vulnerability impacts Cisco gadgets working susceptible releases of Cisco Safe FTD Software program with an intrusion coverage enabled that has the Snort 3 engine working. Organizations should confirm that Snort 3 is actively working on their methods, because the vulnerability can’t be exploited if Snort 3 isn’t lively.

Cisco has confirmed that a number of merchandise will not be affected by this vulnerability, together with Cisco Safe Firewall Adaptive Safety Equipment (ASA) Software program, Cisco Safe Firewall Administration Middle (FMC) Software program, and each Open Supply Snort 2 and Snort 3 Software program.

In contrast to many safety vulnerabilities, Cisco has explicitly said that no workarounds can be found to handle this difficulty. This leaves organizations with just one choice: making use of the software program updates launched by Cisco. The corporate has launched free software program updates that utterly tackle the vulnerability.

This vulnerability provides to a rising record of safety points affecting Cisco’s firewall and VPN merchandise. Current months have seen a number of high-severity flaws disclosed, together with CVE-2025-20265 (CVSS 10.0) affecting Safe Firewall Administration Middle and several other different denial-of-service vulnerabilities in ASA and FTD merchandise.

Safety researchers have famous that Cisco has a historical past of vulnerabilities in its Snort detection engine and FTD product line, together with a number of denial-of-service vulnerabilities associated to packet inspection and site visitors dealing with.

Whereas Cisco sometimes responds with immediate advisories and patches, the recurring nature of those points underscores the significance of well timed patch administration for organizations counting on Cisco safety merchandise.

As of the publication date, the Cisco Product Safety Incident Response Crew (PSIRT) reported that it’s not conscious of any public bulletins or malicious use of the vulnerability.

The vulnerability was found in the course of the decision of a Cisco Technical Help Middle (TAC) assist case moderately than by way of exterior menace intelligence.

Given the distant, unauthenticated nature of the assault vector and the important function that Cisco FTD gadgets play in enterprise community safety, safety consultants are advising organizations to prioritize patching efforts.

The short-term lack of site visitors inspection capabilities throughout exploitation may present attackers with home windows of alternative to infiltrate networks or exfiltrate knowledge undetected.

Organizations utilizing Cisco Safe Firewall Menace Protection Software program are strongly suggested to instantly assess their publicity utilizing Cisco’s Software program Checker instrument and apply the out there safety updates to forestall potential exploitation of this important vulnerability.

Increase your SOC and assist your group defend your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attacks, Cisco, Detection, DoS, Enables, Engine, Firewall, Secure, Snort, Vulnerability

Post navigation

Previous Post: Top 10 Best Deception Tools in 2025
Next Post: HexStrike AI Connects ChatGPT, Claude, Copilot with 150+ Security Tools like Burp Suite and Nmap

Related Posts

Russian Basketball Player Arrested over Alleged Ransomware Attack Claims Cyber Security News
Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities Cyber Security News
New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users Cyber Security News
Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague Cyber Security News
Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce Cyber Security News
Hackers Allegedly Destroyed Aeroflot Airlines’ IT Infrastructure in Year-Long Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Critical Zoom Flaw, City’s Water Threatened by Hack, $330 Billion OT Cyber Risk
  • U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions
  • New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash
  • Privacy in the Age of Agentic AI
  • Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Critical Zoom Flaw, City’s Water Threatened by Hack, $330 Billion OT Cyber Risk
  • U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions
  • New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash
  • Privacy in the Age of Agentic AI
  • Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News