CVE-2021-40116

8.6 HIGH

📋 TL;DR

This vulnerability in Cisco products with Snort3 configured allows unauthenticated remote attackers to cause denial of service by sending crafted IP packets. The attack causes through traffic to be dropped on affected devices. Only products with Snort3 configured and specific rule actions (Block with Reset or Interactive Block with Reset) are vulnerable.

💻 Affected Systems

Products:
  • Cisco Firepower Threat Defense (FTD)
  • Cisco Firepower Management Center (FMC)
  • Cisco Secure Firewall Management Center
  • Cisco Secure Firewall Threat Defense
Versions: Multiple versions with Snort3 configured
Operating Systems: Cisco-specific OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Snort3 is configured AND specific rule actions (Block with Reset or Interactive Block with Reset) are enabled without proper constraints

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service on affected network devices, disrupting all network traffic through the device

🟠

Likely Case

Intermittent traffic drops and service disruption affecting network availability

🟢

If Mitigated

No impact if Snort3 is not configured with vulnerable rule actions or if workarounds are implemented

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers on the internet to target vulnerable devices
🏢 Internal Only: MEDIUM - Internal attackers could still exploit, but requires network access to the vulnerable device

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted IP packets to vulnerable devices, which is relatively straightforward for attackers with network access

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple fixed versions depending on product - see Cisco advisory for specific versions

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-RywH7ezM

Restart Required: Yes

Instructions:

1. Review Cisco advisory for specific fixed versions for your product. 2. Apply the appropriate patch/update. 3. Restart affected services or devices as required.

🔧 Temporary Workarounds

Disable vulnerable rule actions

all

Remove or disable rules using Block with Reset or Interactive Block with Reset actions in Snort3 configuration

# Configuration varies by product - consult Cisco documentation for specific commands

Use Snort2 instead of Snort3

all

Configure affected devices to use Snort2 instead of Snort3

# Configuration varies by product - consult Cisco documentation for specific commands

🧯 If You Can't Patch

  • Implement network segmentation to limit access to vulnerable devices
  • Apply strict firewall rules to limit which IP addresses can send traffic to vulnerable devices

🔍 How to Verify

Check if Vulnerable:

Check if Snort3 is configured and if rules with Block with Reset or Interactive Block with Reset actions are enabled without proper constraints

Check Version:

# Command varies by product - typically 'show version' or similar in CLI

Verify Fix Applied:

Verify that patches have been applied and check version against Cisco's fixed versions list

📡 Detection & Monitoring

Log Indicators:

  • Unusual traffic drops
  • Snort3 process restarts
  • High CPU/memory usage on affected devices

Network Indicators:

  • Sudden increase in traffic to specific ports on affected devices
  • Unusual IP packet patterns

SIEM Query:

Search for traffic drops or device restarts on Cisco FTD/FMC devices with Snort3 configured

🔗 References

📤 Share & Export