{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T04:07:48.583","vulnerabilities":[{"cve":{"id":"CVE-2026-20068","sourceIdentifier":"psirt@cisco.com","published":"2026-03-04T18:16:22.330","lastModified":"2026-03-05T19:39:11.967","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple Cisco products are affected by a vulnerability in the Snort 3 detection engine that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart, resulting in an interruption of packet inspection.\r\n\r\nThis vulnerability is due to incomplete error checking when parsing remote procedure call (RPC) data. An attacker could exploit this vulnerability by sending crafted RPC packets through an established connection to be parsed by Snort 3. A successful exploit could allow the attacker to cause a DoS condition when the Snort 3 Detection Engine unexpectedly restarts."},{"lang":"es","value":"Múltiples productos Cisco se ven afectados por una vulnerabilidad en el motor de detección de Snort 3 que podría permitir a un atacante remoto no autenticado provocar el reinicio del motor de detección de Snort 3, lo que resultaría en una interrupción de la inspección de paquetes.\n\nEsta vulnerabilidad se debe a una comprobación de errores incompleta al analizar datos de llamadas a procedimiento remoto (RPC). Un atacante podría explotar esta vulnerabilidad enviando paquetes RPC manipulados a través de una conexión establecida para ser analizados por Snort 3. Un exploit exitoso podría permitir al atacante causar una condición de DoS cuando el motor de detección de Snort 3 se reinicia inesperadamente."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-248"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-multi-dos-XFWkWSwz","source":"psirt@cisco.com"}]}}]}