Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20067: Out-of-bounds Write in Cisco Cisco Cyber Vision

0
Medium
VulnerabilityCVE-2026-20067cvecve-2026-20067
Published: Wed Mar 04 2026 (03/04/2026, 17:49:02 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Cyber Vision

Description

Multiple Cisco products are affected by a vulnerability in the Snort 3 detection engine that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart, resulting in an interruption of packet inspection.  This vulnerability is due to incomplete error checking when parsing the Multicast DNS fields of the HTTP header. An attacker could exploit this vulnerability by sending crafted HTTP packets through an established connection to be parsed by Snort 3. A successful exploit could allow the attacker to cause a DoS condition when the Snort 3 Detection Engine unexpectedly restarts.

AI-Powered Analysis

AILast updated: 03/04/2026, 18:34:02 UTC

Technical Analysis

CVE-2026-20067 is an out-of-bounds write vulnerability in the Snort 3 detection engine embedded within Cisco Cyber Vision products. The root cause is incomplete error checking during the parsing of Multicast DNS fields within HTTP headers. An unauthenticated remote attacker can exploit this by sending specially crafted HTTP packets through an established connection that the Snort 3 engine processes. This crafted input triggers an out-of-bounds write condition, causing the Snort 3 Detection Engine to restart unexpectedly. The restart interrupts the packet inspection process, effectively causing a denial-of-service (DoS) condition. The vulnerability affects a wide range of Cisco Cyber Vision versions, from 3.0.0 through 5.3.2, indicating a long-standing issue across multiple releases. The CVSS v3.1 base score is 5.8, reflecting medium severity with network attack vector, low complexity, no privileges required, no user interaction, and impact limited to availability. There is no impact on confidentiality or integrity. No known exploits have been reported in the wild to date. Cisco Cyber Vision is widely used for industrial network visibility and security, making continuous operation critical. The vulnerability’s exploitation could disrupt security monitoring and incident detection capabilities, potentially allowing other attacks to go unnoticed. The issue stems from the Snort 3 engine’s handling of multicast DNS fields embedded in HTTP headers, a somewhat uncommon but plausible attack vector. The vulnerability highlights the importance of robust input validation and error handling in network security tools that parse complex protocols. While the direct impact is a DoS condition, the operational impact on industrial and critical infrastructure environments could be significant if left unmitigated.

Potential Impact

The primary impact of CVE-2026-20067 is a denial-of-service condition caused by the unexpected restart of the Snort 3 Detection Engine within Cisco Cyber Vision. This interruption halts packet inspection, potentially leaving networks blind to malicious traffic and attacks during the downtime. For organizations relying on Cisco Cyber Vision for industrial network visibility and security monitoring, this could degrade their ability to detect and respond to threats in real time. The vulnerability does not compromise confidentiality or integrity, but the loss of availability of the detection engine can indirectly increase risk by reducing situational awareness. Critical infrastructure sectors such as energy, manufacturing, transportation, and utilities that use Cisco Cyber Vision are particularly vulnerable to operational disruptions. Attackers could exploit this vulnerability to create persistent monitoring gaps, facilitating further attacks or lateral movement within networks. The broad range of affected versions means many organizations may be exposed, especially those with delayed patching cycles. Although no known exploits exist currently, the ease of exploitation (no authentication or user interaction required) and network attack vector increase the likelihood of future exploitation attempts. The scope of affected systems is significant given Cisco Cyber Vision’s deployment in industrial control system environments worldwide.

Mitigation Recommendations

1. Apply official patches or updates from Cisco as soon as they become available to address the vulnerability in the Snort 3 detection engine. 2. In the interim, restrict network access to Cisco Cyber Vision devices and Snort 3 engines by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 3. Monitor network traffic for anomalous HTTP packets containing malformed or suspicious multicast DNS fields, which could indicate exploitation attempts. 4. Employ intrusion detection and prevention systems to detect and block crafted packets targeting this vulnerability. 5. Conduct regular audits of Cisco Cyber Vision deployments to ensure they are running supported and updated software versions. 6. Implement redundancy and failover mechanisms for network monitoring tools to maintain visibility during potential DoS events. 7. Educate security operations teams about this vulnerability and incorporate detection of related anomalies into incident response playbooks. 8. Collaborate with Cisco support for guidance on temporary workarounds or configuration changes that may reduce risk until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.357Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a8777ad1a09e29cb54d380

Added to database: 3/4/2026, 6:18:34 PM

Last enriched: 3/4/2026, 6:34:02 PM

Last updated: 3/5/2026, 4:44:02 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses