Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-00308

Опубликовано: 02 нояб. 2022
Источник: fstec
CVSS3: 5.8
CVSS2: 5
EPSS Низкий

Описание

Уязвимость процесса аутентификации и авторизации для VPN-соединений микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Cisco Firepower Threat Defense (FTD) связана с недостатками контроля доступа. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, получить доступ к системе от имени другого пользователя

Вендор

Cisco Systems Inc.

Наименование ПО

Adaptive Security Appliance
Firepower Threat Defense

Версия ПО

9.6.2 (Adaptive Security Appliance)
6.2.1 (Firepower Threat Defense)
до 9.8.2.26 (Adaptive Security Appliance)
7.0.0 (Firepower Threat Defense)
от 6.7.0 до 6.7.0.3 включительно (Firepower Threat Defense)
от 6.5.0 до 6.5.0.5 включительно (Firepower Threat Defense)
6.6.0 (Firepower Threat Defense)
6.6.0.1 (Firepower Threat Defense)
6.6.1 (Firepower Threat Defense)
6.6.3 (Firepower Threat Defense)
6.6.4 (Firepower Threat Defense)
6.6.5 (Firepower Threat Defense)
6.6.5.1 (Firepower Threat Defense)
от 6.2.3 до 6.2.3.18 включительно (Firepower Threat Defense)
от 6.3.0 до 6.3.0.5 включительно (Firepower Threat Defense)
от 6.4.0 до 6.4.0.14 включительно (Firepower Threat Defense)
7.0.0.1 (Firepower Threat Defense)
7.0.1 (Firepower Threat Defense)
7.0.1.1 (Firepower Threat Defense)
от 7.1.0 до 7.1.0.2 включительно (Firepower Threat Defense)
от 6.1.0 до 6.1.0.7 включительно (Firepower Threat Defense)
от 6.2.0 до 6.2.0.6 включительно (Firepower Threat Defense)
от 6.2.2 до 6.2.2.5 включительно (Firepower Threat Defense)
7.1.0.1 (Firepower Threat Defense)
9.6.1 (Adaptive Security Appliance)
9.6.1.3 (Adaptive Security Appliance)
9.6.1.5 (Adaptive Security Appliance)
9.6.1.10 (Adaptive Security Appliance)
9.6.2.1 (Adaptive Security Appliance)
9.6.2.3 (Adaptive Security Appliance)
9.6.2.7 (Adaptive Security Appliance)
9.6.2.11 (Adaptive Security Appliance)
9.6.2.13 (Adaptive Security Appliance)
9.6.2.22 (Adaptive Security Appliance)
9.6.2.23 (Adaptive Security Appliance)
9.6.3 (Adaptive Security Appliance)
9.6.3.8 (Adaptive Security Appliance)
9.6.3.9 (Adaptive Security Appliance)
9.6.3.11 (Adaptive Security Appliance)
9.6.3.12 (Adaptive Security Appliance)
9.6.3.14 (Adaptive Security Appliance)
9.6.3.17 (Adaptive Security Appliance)
9.6.3.20 (Adaptive Security Appliance)
9.6.4 (Adaptive Security Appliance)
9.6.4.3 (Adaptive Security Appliance)
9.6.4.5 (Adaptive Security Appliance)
9.6.4.6 (Adaptive Security Appliance)
9.6.4.8 (Adaptive Security Appliance)
9.6.4.10 (Adaptive Security Appliance)
9.6.4.12 (Adaptive Security Appliance)
9.6.4.14 (Adaptive Security Appliance)
9.6.4.17 (Adaptive Security Appliance)
9.6.4.18 (Adaptive Security Appliance)
9.6.4.20 (Adaptive Security Appliance)
9.6.4.22 (Adaptive Security Appliance)
9.6.4.23 (Adaptive Security Appliance)
9.6.4.24 (Adaptive Security Appliance)
9.6.4.25 (Adaptive Security Appliance)
9.6.4.29 (Adaptive Security Appliance)
9.6.4.30 (Adaptive Security Appliance)
9.6.4.34 (Adaptive Security Appliance)
9.6.4.36 (Adaptive Security Appliance)
9.6.4.40 (Adaptive Security Appliance)
9.6.4.41 (Adaptive Security Appliance)
9.6.4.42 (Adaptive Security Appliance)
9.6.4.45 (Adaptive Security Appliance)
9.7.1 (Adaptive Security Appliance)
9.7.1.2 (Adaptive Security Appliance)
9.7.1.4 (Adaptive Security Appliance)
9.7.1.8 (Adaptive Security Appliance)
9.7.1.15 (Adaptive Security Appliance)
9.7.1.16 (Adaptive Security Appliance)
9.7.1.21 (Adaptive Security Appliance)
9.7.1.24 (Adaptive Security Appliance)
9.8.1 (Adaptive Security Appliance)
9.8.1.5 (Adaptive Security Appliance)
9.8.1.7 (Adaptive Security Appliance)
9.8.2 (Adaptive Security Appliance)
9.8.2.8 (Adaptive Security Appliance)
9.8.2.14 (Adaptive Security Appliance)
9.8.2.15 (Adaptive Security Appliance)
9.8.2.17 (Adaptive Security Appliance)
9.8.2.20 (Adaptive Security Appliance)
9.8.2.24 (Adaptive Security Appliance)
9.8.2.26 (Adaptive Security Appliance)
9.8.2.28 (Adaptive Security Appliance)
9.8.2.33 (Adaptive Security Appliance)
9.8.2.35 (Adaptive Security Appliance)
9.8.2.38 (Adaptive Security Appliance)
9.8.3 (Adaptive Security Appliance)
9.8.3.8 (Adaptive Security Appliance)
9.8.3.11 (Adaptive Security Appliance)
9.8.3.14 (Adaptive Security Appliance)
9.8.3.16 (Adaptive Security Appliance)
9.8.3.18 (Adaptive Security Appliance)
9.8.3.21 (Adaptive Security Appliance)
9.8.3.26 (Adaptive Security Appliance)
9.8.3.29 (Adaptive Security Appliance)
9.8.4 (Adaptive Security Appliance)
9.8.4.3 (Adaptive Security Appliance)
9.8.4.7 (Adaptive Security Appliance)
9.8.4.8 (Adaptive Security Appliance)
9.8.4.10 (Adaptive Security Appliance)
9.8.4.12 (Adaptive Security Appliance)
9.8.4.15 (Adaptive Security Appliance)
9.8.4.17 (Adaptive Security Appliance)

Тип ПО

ПО сетевого программно-аппаратного средства
ПО программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 5)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,8)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-vp-authz-N2GckjN6

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 36%
0.00156
Низкий

5.8 Medium

CVSS3

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.8
nvd
около 3 лет назад

A vulnerability in the authentication and authorization flows for VPN connections in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to establish a connection as a different user. This vulnerability is due to a flaw in the authorization verifications during the VPN authentication flow. An attacker could exploit this vulnerability by sending a crafted packet during a VPN authentication. The attacker must have valid credentials to establish a VPN connection. A successful exploit could allow the attacker to establish a VPN connection with access privileges from a different user.

CVSS3: 5.8
github
около 3 лет назад

A vulnerability in the authentication and authorization flows for VPN connections in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to establish a connection as a different user. This vulnerability is due to a flaw in the authorization verifications during the VPN authentication flow. An attacker could exploit this vulnerability by sending a crafted packet during a VPN authentication. The attacker must have valid credentials to establish a VPN connection. A successful exploit could allow the attacker to establish a VPN connection with access privileges from a different user.

EPSS

Процентиль: 36%
0.00156
Низкий

5.8 Medium

CVSS3

5 Medium

CVSS2