{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T06:56:19.969","vulnerabilities":[{"cve":{"id":"CVE-2021-1224","sourceIdentifier":"psirt@cisco.com","published":"2021-01-13T22:15:20.410","lastModified":"2024-11-26T16:09:02.407","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect detection of the HTTP payload if it is contained at least partially within the TFO connection handshake. An attacker could exploit this vulnerability by sending crafted TFO packets with an HTTP payload through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload."},{"lang":"es","value":"Múltiples productos de Cisco están afectados por una vulnerabilidad con TCP Fast Open (TFO) cuando se usan en conjunto con el motor de detección Snort que podría permitir a un atacante remoto no autenticado omitir una política de archivos configurada para HTTP.&#xa0;La vulnerabilidad es debido a la detección incorrecta de la carga útil HTTP si está contenida al menos parcialmente dentro del protocolo de enlace de la conexión TFO.&#xa0;Un atacante podría explotar esta vulnerabilidad mediante el envío de paquetes TFO diseñados con una carga útil HTTP a través de un dispositivo afectado.&#xa0;Una explotación con éxito podría permitir al atacante omitir la política de archivos configurada para paquetes HTTP y entregar una carga útil maliciosa."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-693"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionEndExcluding":"6.7.0","matchCriteriaId":"CB1B5DAC-CE54-43E4-89F6-6DFD7A65C8EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*","matchCriteriaId":"2986D5BD-1936-41BD-A992-7672C019F27E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*","matchCriteriaId":"42493B4F-0CF2-45F0-B72D-36F0597CC274"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*","matchCriteriaId":"06F2E7D8-BB95-480D-AE3E-F9B97C3A5379"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*","matchCriteriaId":"6F41C382-C849-465C-AF77-0A787CA03BA7"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.18:*:*:*:*:*:*:*","matchCriteriaId":"80AD91C6-B7E3-48AC-8A51-3C05FE2659AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"408B880A-50EF-4246-BF38-213D812BD0BE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*","versionEndExcluding":"17.4.1","matchCriteriaId":"72B91784-38A9-4A2A-AA92-8AB558924BBD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"A2D2305B-B69E-4F74-A44E-07B3205CE9F7"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5AAD4397-6DCF-493A-BD61-3A890F6F3AB2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"BB9229F3-7BCE-46C4-9879-D57B5BAAE44E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"6C8AED7C-DDA3-4C29-BB95-6518C02C551A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"9421DBEF-AE42-4234-B49F-FCC34B804D7F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5419CB9F-241F-4431-914F-2659BE27BEA5"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5720462A-BE6B-4E84-A1A1-01E80BBA86AD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"818CEFA6-208C-43C3-8E43-474A93ADCF21"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"E8B60888-6E2B-494E-AC65-83337661EE7D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*","matchCriteriaId":"BF8B0B49-2C99-410B-B011-5B821C5992FB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:isa_3000:-:*:*:*:*:*:*:*","matchCriteriaId":"9510E97A-FD78-43C6-85BC-223001ACA264"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*","versionEndExcluding":"2.9.17","matchCriteriaId":"715F9721-D26C-4086-873F-837D0FCAF1A5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx64_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"7BCF0950-162A-4E47-BA2A-43701EA7782E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*","matchCriteriaId":"BE749570-1EA6-4734-B96A-D02B3BA3A756"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"15CD8683-DFB3-45E3-B6E2-92AFD846B0BA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*","matchCriteriaId":"B1038F5F-020D-41FD-9C3D-F2685F1EA916"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx67_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"FF993C79-4C7F-4B99-B8BB-3996C4F3D8F0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*","matchCriteriaId":"2702FE73-E4AC-45C7-A212-44D783720798"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx67c_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"2C6A8AAC-9813-45C9-8C69-0579C0ADA0C3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*","matchCriteriaId":"E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"4B2F5CB3-1AE0-4905-A28B-090FDA56622E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*","matchCriteriaId":"F2529662-8A54-4DFC-80E7-922CF22DE2F3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx68_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"24AB6590-8775-4744-BF84-892F0BD10225"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*","matchCriteriaId":"2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"39884334-73AF-4E98-B05A-20FFF82B5DF1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*","matchCriteriaId":"18E682AA-05AD-483F-915F-A2B2C98233B7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"85EF67F0-973F-4FD1-8077-CE68D2AB1149"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*","matchCriteriaId":"03F9C184-3811-4A26-846D-54ECE7CF939F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx100_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"77C0B39F-AE49-44D7-8951-9DB0464FE43B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*","matchCriteriaId":"4D4DE139-CCB5-4BDD-8827-07348B8F0FF2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx84_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"8398495B-47DB-4A16-AF8C-053685D5DD9C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*","matchCriteriaId":"B5A4239D-E115-4368-895A-002BBD94F243"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx250_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"90EC4BA2-0FA2-4841-9AB1-3FC92D22530D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*","matchCriteriaId":"2D6CBE98-6B20-4F05-8871-0BEAD1D351B0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:meraki_mx450_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"A685A8D6-9B97-46B3-8087-0D44EE0D65AD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*","matchCriteriaId":"1B35EB71-8584-4803-A438-AEC406FD8445"}]}]}],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html","source":"psirt@cisco.com"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://www.debian.org/security/2023/dsa-5354","source":"psirt@cisco.com"},{"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.debian.org/security/2023/dsa-5354","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}