Lucene search

K
ciscoCiscoCISCO-SA-ASAFTD-RULE-BYPASS-EJJOGQEY
HistoryOct 27, 2021 - 4:00 p.m.

Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Identity-Based Rule Bypass Vulnerability

2021-10-2716:00:00
tools.cisco.com
22

0.001 Low

EPSS

Percentile

45.1%

A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass security protections.

This vulnerability is due to improper handling of network requests by affected devices configured to use object group search. An attacker could exploit this vulnerability by sending a specially crafted network request to an affected device. A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device, bypass security protections, and send network traffic to unauthorized hosts.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-ejjOgQEY [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-ejjOgQEY”]

This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2021 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication [“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74773”].

Affected configurations

Vulners
Node
ciscoadaptive_security_virtual_applianceMatch9.8
OR
ciscoadaptive_security_virtual_applianceMatch9.12
OR
ciscoadaptive_security_virtual_applianceMatch9.14
OR
ciscoadaptive_security_virtual_applianceMatch9.15
OR
ciscofirepowerMatchany
OR
ciscoasa_5500-x_series_ips_ssp_softwareMatchany
OR
cisconx-osMatchanynexus_9000_series
OR
ciscofirepowerMatchany
OR
ciscofirepower_threat_defense_softwareMatchany
OR
ciscoadaptive_security_virtual_applianceMatch9.8.2.15
OR
ciscoadaptive_security_virtual_applianceMatch9.8.3.8
OR
ciscoadaptive_security_virtual_applianceMatch9.8.3.11
OR
ciscoadaptive_security_virtual_applianceMatch9.12.4.18
OR
ciscoadaptive_security_virtual_applianceMatch9.14.2.4
OR
ciscoadaptive_security_virtual_applianceMatch9.14.2.13
OR
ciscoadaptive_security_virtual_applianceMatch9.15.1.16
OR
ciscofirepower_services_for_adaptive_security_applianceMatch2100_series
OR
ciscoasaMatch5500-x_series_firewalls
OR
ciscofirepower_services_for_adaptive_security_applianceMatch9000_series
OR
ciscofirepower_services_for_adaptive_security_applianceMatch4100_series
OR
ciscofirepower_threat_defense_softwareMatchany
OR
ciscofirepower_services_for_adaptive_security_applianceMatch2100_series
OR
ciscoasaMatch5500-x_series_firewalls
OR
ciscofirepower_services_for_adaptive_security_applianceMatch9000_series
OR
ciscoasaMatch5500-x_series_firewalls
OR
ciscofirepower_services_for_adaptive_security_applianceMatch9000_series
OR
ciscoasaMatch5500-x_series_firewalls
OR
ciscofirepower_services_for_adaptive_security_applianceMatch4100_series

0.001 Low

EPSS

Percentile

45.1%

Related for CISCO-SA-ASAFTD-RULE-BYPASS-EJJOGQEY