CVE-2021-1224

Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect detection of the HTTP payload if it is contained at least partially within the TFO connection handshake. An attacker could exploit this vulnerability by sending crafted TFO packets with an HTTP payload through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.18:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:3.0.1:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isa_3000:-:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:cisco:meraki_mx64_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:cisco:meraki_mx67_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:cisco:meraki_mx67c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:cisco:meraki_mx68_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:cisco:meraki_mx100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:cisco:meraki_mx84_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:cisco:meraki_mx250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:cisco:meraki_mx450_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*

History

26 Nov 2024, 16:09

Type Values Removed Values Added
First Time Cisco secure Firewall Management Center
CPE cpe:2.3:a:cisco:firepower_management_center:2.9.16:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center:2.9.15:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center:2.9.14.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center:2.9.17:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center:2.9.18:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.18:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*
First Time Cisco secure Firewall Management Center
CPE cpe:2.3:a:cisco:firepower_management_center:2.9.16:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center:2.9.15:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center:2.9.14.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center:2.9.17:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_management_center:2.9.18:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.18:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*

21 Nov 2024, 05:43

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html - () https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html -
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes - Vendor Advisory
References () https://www.debian.org/security/2023/dsa-5354 - () https://www.debian.org/security/2023/dsa-5354 -
CVSS v2 : 5.0
v3 : 5.3
v2 : 5.0
v3 : 5.8

22 May 2023, 18:57

Type Values Removed Values Added
First Time Cisco 1100-4p Integrated Services Router
Cisco 4351 Integrated Services Router
Cisco 1109-4p Integrated Services Router
Cisco 1111x-8p Integrated Services Router
Cisco 4461 Integrated Services Router
Cisco 4321 Integrated Services Router
Cisco 1100-8p Integrated Services Router
Cisco 4451-x Integrated Services Router
Cisco 1109-2p Integrated Services Router
Cisco 4221 Integrated Services Router
Cisco 4331 Integrated Services Router
Cisco 1101-4p Integrated Services Router
Cisco 4431 Integrated Services Router
CPE cpe:2.3:h:cisco:isr_1100-8p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1109-4p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4221:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1100-4p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1111x-8p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4331:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4431:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1109-2p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1101-4p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4461:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4321:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4451-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_4351:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*

Information

Published : 2021-01-13 22:15

Updated : 2024-11-26 16:09


NVD link : CVE-2021-1224

Mitre link : CVE-2021-1224

CVE.ORG link : CVE-2021-1224


JSON object : View

Products Affected

cisco

  • meraki_mx68w
  • 4221_integrated_services_router
  • meraki_mx84_firmware
  • meraki_mx68_firmware
  • 4451-x_integrated_services_router
  • meraki_mx84
  • meraki_mx67c_firmware
  • 1100-4p_integrated_services_router
  • 4351_integrated_services_router
  • meraki_mx67
  • meraki_mx67_firmware
  • meraki_mx450
  • ios_xe
  • csr_1000v
  • meraki_mx68
  • meraki_mx68cw_firmware
  • meraki_mx68w_firmware
  • meraki_mx250_firmware
  • meraki_mx67c
  • isa_3000
  • 1100-8p_integrated_services_router
  • 1111x-8p_integrated_services_router
  • meraki_mx450_firmware
  • 4321_integrated_services_router
  • meraki_mx64_firmware
  • meraki_mx67w
  • meraki_mx68cw
  • meraki_mx64
  • 4461_integrated_services_router
  • 1101-4p_integrated_services_router
  • 1109-2p_integrated_services_router
  • 4331_integrated_services_router
  • secure_firewall_management_center
  • meraki_mx100
  • 1109-4p_integrated_services_router
  • meraki_mx64w
  • meraki_mx67w_firmware
  • meraki_mx250
  • firepower_threat_defense
  • meraki_mx64w_firmware
  • meraki_mx100_firmware
  • 4431_integrated_services_router

snort

  • snort
CWE
CWE-693

Protection Mechanism Failure

NVD-CWE-Other