{"id":"CVE-2021-1236","details":"Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.","modified":"2026-03-15T14:42:07.400324Z","published":"2021-01-13T22:15:20.583Z","related":["MGASA-2023-0117"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html"},{"type":"ADVISORY","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5354"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"17.4.1"}]},{"events":[{"introduced":"0"},{"fixed":"6.5.0.5"}]},{"events":[{"introduced":"0"},{"last_affected":"2.9.14.0"}]},{"events":[{"introduced":"0"},{"last_affected":"2.9.14.14"}]},{"events":[{"introduced":"0"},{"last_affected":"2.9.15"}]},{"events":[{"introduced":"0"},{"last_affected":"2.9.16"}]},{"events":[{"introduced":"0"},{"last_affected":"2.9.17"}]},{"events":[{"introduced":"0"},{"fixed":"2.9.14"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-1236.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}