{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T18:10:31.745","vulnerabilities":[{"cve":{"id":"CVE-2021-40114","sourceIdentifier":"psirt@cisco.com","published":"2021-10-27T19:15:08.667","lastModified":"2024-11-26T16:09:02.407","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload."},{"lang":"es","value":"Múltiples productos de Cisco están afectados por una vulnerabilidad en la forma en que el motor de detección Snort procesa el tráfico ICMP que podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a una administración inapropiada de los recursos de memoria mientras el motor de detección Snort procesa paquetes ICMP. Un atacante podría explotar esta vulnerabilidad mediante el envío de una serie de paquetes ICMP mediante un dispositivo afectado. Una explotación con éxito podría permitir al atacante agotar los recursos del dispositivo afectado, causando la recarga del mismo"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionEndExcluding":"6.4.0.12","matchCriteriaId":"FAE65CB5-08E5-41B6-9AC0-02451C90E833"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5.0","versionEndExcluding":"6.6.3","matchCriteriaId":"D042ED9F-3702-4959-AAA0-D98684EB4556"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7.0","versionEndExcluding":"6.7.0.2","matchCriteriaId":"FDDF492B-BC61-4814-B05F-3F6CD07080F7"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*","matchCriteriaId":"2986D5BD-1936-41BD-A992-7672C019F27E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*","matchCriteriaId":"42493B4F-0CF2-45F0-B72D-36F0597CC274"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*","matchCriteriaId":"06F2E7D8-BB95-480D-AE3E-F9B97C3A5379"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*","matchCriteriaId":"6F41C382-C849-465C-AF77-0A787CA03BA7"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*","versionStartIncluding":"16.12","versionEndExcluding":"16.12.6","matchCriteriaId":"174C4020-E642-48F7-BCC5-884834D3EBBB"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*","versionStartIncluding":"17.3","versionEndExcluding":"17.3.4a","matchCriteriaId":"F4521953-E027-498C-8484-A4E76A737347"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*","versionStartIncluding":"17.4","versionEndExcluding":"17.4.2","matchCriteriaId":"3248706E-3F8C-4F74-900E-3302ACF2E716"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.9.18","matchCriteriaId":"7DEEA69A-4557-409E-A0EC-981F2C7C828A"}]}]}],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html","source":"psirt@cisco.com"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://www.debian.org/security/2023/dsa-5354","source":"psirt@cisco.com"},{"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.debian.org/security/2023/dsa-5354","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}