{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T15:51:51.800","vulnerabilities":[{"cve":{"id":"CVE-2025-20217","sourceIdentifier":"psirt@cisco.com","published":"2025-08-14T17:15:35.520","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the packet inspection functionality of the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to incorrect processing of traffic that is inspected by an affected device. An attacker could exploit this vulnerability by sending crafted traffic through the affected device. A successful exploit could allow the attacker to cause the affected device to enter an infinite loop while inspecting traffic, resulting in a DoS condition. The system watchdog will restart the Snort process automatically."},{"lang":"es","value":"Una vulnerabilidad en la función de inspección de paquetes del motor de detección Snort 3 del software Cisco Secure Firewall Threat Defense (FTD) podría permitir que un atacante remoto no autenticado provoque una denegación de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe al procesamiento incorrecto del tráfico inspeccionado por un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad enviando tráfico manipulado a través del dispositivo afectado. Una explotación exitosa podría permitir al atacante provocar que el dispositivo afectado entre en un bucle infinito mientras inspecciona el tráfico, lo que resultaría en una denegación de servicio (DoS). El sistema de vigilancia reiniciará el proceso Snort automáticamente."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-835"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-SvKhtjgt","source":"psirt@cisco.com"}]}}]}