NA

CVE-2022-20685

Vulnerability Summary

A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the malicious user to cause the Snort process to hang, causing traffic inspection to stop. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj

Vulnerability Trend

Vendor Advisories

A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device This vulnerability is due to an integer overflow while processing Modbus traffic An attacker could exploit this vulnerability by sending crafted Modbus traffic ...

Github Repositories

https://doi.org/10.51408/1963-0103

Research-the-Model-of-Increasing-Reliability-of-the-Intrusion-Detection-System The paper presents the results of results on the use of a recurrent neural network to detect malicious software as part of the Snort intrusion detection system The research was conducted on datasets generated on the basis of malware athena, dyre, engrat, grum, mimikatz, surtr source code: With explo