{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-20T06:06:11.184","vulnerabilities":[{"cve":{"id":"CVE-2026-20065","sourceIdentifier":"psirt@cisco.com","published":"2026-03-04T18:16:21.350","lastModified":"2026-03-05T19:39:11.967","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple Cisco products are affected by a vulnerability in the Snort 3 Detection Engine that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart, resulting in an interruption of packet inspection.\r\n\r\nThis vulnerability is due to an error in the binder module initialization logic of the Snort Detection Engine. An attacker could exploit this vulnerability by sending certain packets through an established connection that is parsed by Snort 3. A successful exploit could allow the attacker to cause a DoS condition when the Snort 3 Detection Engine restarts unexpectedly."},{"lang":"es","value":"Múltiples productos Cisco se ven afectados por una vulnerabilidad en el motor de detección Snort 3 que podría permitir a un atacante remoto no autenticado provocar que el motor de detección Snort 3 se reinicie, lo que resultaría en una interrupción de la inspección de paquetes.\n\nEsta vulnerabilidad se debe a un error en la lógica de inicialización del módulo 'binder' del motor de detección Snort. Un atacante podría explotar esta vulnerabilidad al enviar ciertos paquetes a través de una conexión establecida que es analizada por Snort 3. Un exploit exitoso podría permitir al atacante provocar una condición de DoS cuando el motor de detección Snort 3 se reinicia inesperadamente."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-667"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-multi-dos-XFWkWSwz","source":"psirt@cisco.com"}]}}]}