
[CIVN-2026-0008] Multiple Vulnerabilities in CISCO
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in CISCO
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Systems Affected
Open Source Snort 3
Cisco Secure Firewall Threat Defense (FTD) Software
Cisco IOS XE Software or UTD Engine for Cisco IOS XE SD-WAN Software
1000 Series Integrated Services Routers (ISRs)
4000 Series ISRs
Catalyst 8000V Edge Software
Catalyst 8200 Series Edge Platforms
Catalyst 8300 Series Edge Platforms
Catalyst 8500L Edge Platforms
Cloud Services Routers 1000V
Integrated Services Virtual Routers
Cisco Meraki software
Note: UTD is not installed on these devices by default. If the UTD file is not installed, the device is not affected by these vulnerabilities.
Overview
Multiple vulnerabilities have been reported in the processing of Distributed Computing Environment Remote Procedure Call (DCE/RPC) requests could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, which would result in an interruption of packet inspection.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
1. Denial of Service Vulnerability ( CVE-2026-20026 )
This vulnerability exists due to an error in buffer handling logic when processing DCE/RPC requests, which can result in a buffer use-after-free read. An attacker could exploit this vulnerability by sending a large number of DCE/RPC requests through an established connection that is inspected by Snort 3.
Successful exploitation of this vulnerability could allow the attacker unexpectedly restart the Snort 3 Detection Engine, which could cause a denial of service (DoS).
2. Information Disclosure vulnerability ( CVE-2026-20027 )
This vulnerability exists due to an error in buffer handling logic when processing DCE/RPC requests, which can result in a buffer out-of-bounds read. An attacker could exploit this vulnerability by sending a large number of DCE/RPC requests through an established connection that is inspected by Snort 3.
Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information in the Snort 3 data stream.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH
CVE Name
CVE-2026-20026
CVE-2026-20027
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=Vs2W
—–END PGP SIGNATURE—–


