Learn about CVE-2020-3299, a vulnerability in Cisco products allowing attackers to bypass HTTP File Policy. Find mitigation steps and patching details here.
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP.
Understanding CVE-2020-3299
This CVE involves a vulnerability in the Snort detection engine in multiple Cisco products that could enable an attacker to bypass configured File Policy for HTTP packets.
What is CVE-2020-3299?
The vulnerability in the Snort detection engine allows an attacker to bypass a configured File Policy for HTTP by sending crafted HTTP packets through an affected device.
The Impact of CVE-2020-3299
If successfully exploited, this vulnerability could allow an attacker to deliver a malicious payload by bypassing the configured File Policy for HTTP packets.
Technical Details of CVE-2020-3299
The following are the technical details of CVE-2020-3299:
Vulnerability Description
The vulnerability is a result of incorrect detection of modified HTTP packets used in chunked responses.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Steps to address and prevent the CVE-2020-3299 vulnerability:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates