{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T23:40:16.040","vulnerabilities":[{"cve":{"id":"CVE-2021-1236","sourceIdentifier":"psirt@cisco.com","published":"2021-01-13T22:15:20.583","lastModified":"2024-11-26T16:09:02.407","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network."},{"lang":"es","value":"Múltiples productos de Cisco están afectados por una vulnerabilidad en el motor de detección de aplicaciones de Snort que podría permitir a un atacante remoto no autenticado omitir las políticas configuradas en un sistema afectado.&#xa0;La vulnerabilidad es debido a un fallo en el algoritmo de detección.&#xa0;Un atacante podría explotar esta vulnerabilidad mediante el envío de paquetes diseñados que fluirían a través de un sistema afectado.&#xa0;Una explotación con éxito podría permitir al atacante omitir las políticas configuradas y entregar una carga útil maliciosa a la red protegida."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N","baseScore":4.0,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-670"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-670"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*","versionEndExcluding":"17.4.1","matchCriteriaId":"72B91784-38A9-4A2A-AA92-8AB558924BBD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"A2D2305B-B69E-4F74-A44E-07B3205CE9F7"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5AAD4397-6DCF-493A-BD61-3A890F6F3AB2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"BB9229F3-7BCE-46C4-9879-D57B5BAAE44E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"6C8AED7C-DDA3-4C29-BB95-6518C02C551A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"9421DBEF-AE42-4234-B49F-FCC34B804D7F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5419CB9F-241F-4431-914F-2659BE27BEA5"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5720462A-BE6B-4E84-A1A1-01E80BBA86AD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"818CEFA6-208C-43C3-8E43-474A93ADCF21"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"E8B60888-6E2B-494E-AC65-83337661EE7D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*","matchCriteriaId":"BF8B0B49-2C99-410B-B011-5B821C5992FB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:isa_3000:-:*:*:*:*:*:*:*","matchCriteriaId":"9510E97A-FD78-43C6-85BC-223001ACA264"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionEndExcluding":"6.5.0.5","matchCriteriaId":"4AFD5C16-FA94-4FDA-9378-F93661419098"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*","matchCriteriaId":"2986D5BD-1936-41BD-A992-7672C019F27E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.14:*:*:*:*:*:*:*","matchCriteriaId":"3D320926-6890-4A7F-85E2-7F46C2791499"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*","matchCriteriaId":"42493B4F-0CF2-45F0-B72D-36F0597CC274"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*","matchCriteriaId":"06F2E7D8-BB95-480D-AE3E-F9B97C3A5379"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*","matchCriteriaId":"6F41C382-C849-465C-AF77-0A787CA03BA7"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*","versionEndExcluding":"2.9.14","matchCriteriaId":"0ADB3B5E-B17C-4D12-9ABE-1817CED279B2"}]}]}],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html","source":"psirt@cisco.com"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://www.debian.org/security/2023/dsa-5354","source":"psirt@cisco.com"},{"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.debian.org/security/2023/dsa-5354","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}