Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.8

Cisco FTD Software: Unauthenticated Remote Attack Traffic Bypass

CVE-2026-20007
Summary

An unauthenticated attacker can bypass security rules and allow malicious traffic onto a network. This affects Cisco FTD Software with Snort 2 and Snort 3 deep packet inspection. To fix this, update to the latest version of the software.

Original title
A vulnerability in the Snort 2 and Snort 3 deep packet inspection of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured Snort r...
Original description
A vulnerability in the Snort 2 and Snort 3 deep packet inspection of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured Snort rules and allow traffic onto the network that should have been dropped.

This vulnerability is due to a logic error in the integration of the Snort Engine rules with Cisco Secure FTD Software that could allow different Snort rules to be hit when deep inspection of the packet is performed for the inner and outer connections. An attacker could exploit this vulnerability by sending crafted traffic to a targeted device that would hit configured Snort rules. A successful exploit could allow the attacker to send traffic to a network where it should have been denied.
nvd CVSS3.1 5.8
Vulnerability type
CWE-284 Improper Access Control
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026