Vulnerability Details CVE-2022-20685
A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 57.5%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2022-20685
-
cpe:2.3:a:cisco:cyber_vision:3.0.0
-
cpe:2.3:a:cisco:cyber_vision:3.0.1
-
cpe:2.3:a:cisco:cyber_vision:3.0.2
-
cpe:2.3:a:cisco:cyber_vision:3.0.3
-
cpe:2.3:a:cisco:cyber_vision:3.0.4
-
cpe:2.3:a:cisco:cyber_vision:3.0.5
-
cpe:2.3:a:cisco:cyber_vision:3.0.6
-
cpe:2.3:a:cisco:cyber_vision:3.1.0
-
cpe:2.3:a:cisco:cyber_vision:3.1.1
-
cpe:2.3:a:cisco:cyber_vision:3.1.2
-
cpe:2.3:a:cisco:cyber_vision:3.2.0
-
cpe:2.3:a:cisco:cyber_vision:3.2.1
-
cpe:2.3:a:cisco:cyber_vision:3.2.2
-
cpe:2.3:a:cisco:cyber_vision:3.2.3
-
cpe:2.3:a:cisco:cyber_vision:3.2.4
-
cpe:2.3:a:cisco:cyber_vision:4.0.0
-
cpe:2.3:a:cisco:cyber_vision:4.0.1
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.1
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.10
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.11
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.12
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.13
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.14
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.15
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.16
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.17
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.18
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.2
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.3
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.4
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.5
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.6
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.7
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.8
-
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.9
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8
-
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9
-
cpe:2.3:a:cisco:firepower_threat_defense:6.6.0
-
cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1
-
cpe:2.3:a:cisco:firepower_threat_defense:6.6.1
-
cpe:2.3:a:cisco:firepower_threat_defense:6.6.3
-
cpe:2.3:a:cisco:firepower_threat_defense:6.6.4
-
cpe:2.3:a:cisco:firepower_threat_defense:6.6.5
-
cpe:2.3:a:cisco:firepower_threat_defense:6.7.0
-
cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.1
-
cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.2
-
cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.3
-
cpe:2.3:a:cisco:firepower_threat_defense:7.0.0
-
cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.1a
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.2
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.3
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.4
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.5
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.12.6
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.1
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.10
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.5
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.6
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.7a
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:16.6.9
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.1.1
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.2.1r
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.3.1a
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.3.2
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.3.3
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.3.4
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.3.4a
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.4.1a
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.4.1b
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.4.2
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.5.1
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.5.1a
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.6.1a
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.7.1a
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:3.17.0s
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:3.17.1s
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:denali-16.3.3
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:denali-16.3.4
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:denali-16.3.5
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:denali-16.3.7
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:denali-16.3.9
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:everest-16.6.2
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:everest-16.6.3
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:everest-16.6.4
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.2
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.3
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.4
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.5
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.6
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.7
-
cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:fuji-16.9.8