Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-08611

Опубликовано: 01 нояб. 2023
Источник: fstec
CVSS3: 5.8
CVSS2: 5
EPSS Низкий

Описание

Уязвимость функции "per-user-override" микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Cisco Firepower Threat Defense (FTD) связана с недостаточной защитой служебных данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, обойти настроенный список управления доступом

Вендор

Cisco Systems Inc.

Наименование ПО

Firepower Threat Defense
Adaptive Security Appliance

Версия ПО

6.4.0 (Firepower Threat Defense)
6.2.3.16 (Firepower Threat Defense)
9.8.4.22 (Adaptive Security Appliance)
9.8.4.25 (Adaptive Security Appliance)
9.12.4.2 (Adaptive Security Appliance)
9.14.1.15 (Adaptive Security Appliance)
9.16.1 (Adaptive Security Appliance)
7.0.0 (Firepower Threat Defense)
7.2.0 (Firepower Threat Defense)
7.2.0.1 (Firepower Threat Defense)
9.14.1 (Adaptive Security Appliance)
9.14.1.10 (Adaptive Security Appliance)
9.14.1.19 (Adaptive Security Appliance)
9.14.1.30 (Adaptive Security Appliance)
9.14.2 (Adaptive Security Appliance)
9.14.2.4 (Adaptive Security Appliance)
9.14.2.8 (Adaptive Security Appliance)
9.14.2.13 (Adaptive Security Appliance)
9.14.2.15 (Adaptive Security Appliance)
9.14.3 (Adaptive Security Appliance)
9.14.3.1 (Adaptive Security Appliance)
9.14.3.9 (Adaptive Security Appliance)
9.14.3.13 (Adaptive Security Appliance)
9.14.3.15 (Adaptive Security Appliance)
9.14.3.18 (Adaptive Security Appliance)
9.15.1 (Adaptive Security Appliance)
9.15.1.1 (Adaptive Security Appliance)
9.15.1.7 (Adaptive Security Appliance)
9.15.1.10 (Adaptive Security Appliance)
9.15.1.21 (Adaptive Security Appliance)
6.6.0 (Firepower Threat Defense)
6.6.0.1 (Firepower Threat Defense)
6.6.1 (Firepower Threat Defense)
6.6.3 (Firepower Threat Defense)
6.6.4 (Firepower Threat Defense)
6.6.5 (Firepower Threat Defense)
6.6.5.1 (Firepower Threat Defense)
6.6.5.2 (Firepower Threat Defense)
7.0.0.1 (Firepower Threat Defense)
7.0.1 (Firepower Threat Defense)
7.0.1.1 (Firepower Threat Defense)
7.0.2 (Firepower Threat Defense)
7.0.2.1 (Firepower Threat Defense)
7.0.3 (Firepower Threat Defense)
7.0.4 (Firepower Threat Defense)
7.1.0.1 (Firepower Threat Defense)
7.1.0.2 (Firepower Threat Defense)
9.8.3.14 (Adaptive Security Appliance)
9.8.3.16 (Adaptive Security Appliance)
9.8.3.18 (Adaptive Security Appliance)
9.8.3.21 (Adaptive Security Appliance)
9.8.3.26 (Adaptive Security Appliance)
9.8.3.29 (Adaptive Security Appliance)
9.8.4 (Adaptive Security Appliance)
9.8.4.3 (Adaptive Security Appliance)
9.8.4.7 (Adaptive Security Appliance)
9.8.4.8 (Adaptive Security Appliance)
9.8.4.10 (Adaptive Security Appliance)
9.8.4.12 (Adaptive Security Appliance)
9.8.4.15 (Adaptive Security Appliance)
9.8.4.17 (Adaptive Security Appliance)
9.14.3.11 (Adaptive Security Appliance)
9.14.4.6 (Adaptive Security Appliance)
9.14.4 (Adaptive Security Appliance)
9.14.4.7 (Adaptive Security Appliance)
9.14.4.12 (Adaptive Security Appliance)
9.15.1.15 (Adaptive Security Appliance)
9.15.1.16 (Adaptive Security Appliance)
9.15.1.17 (Adaptive Security Appliance)
9.16.3 (Adaptive Security Appliance)
9.16.3.3 (Adaptive Security Appliance)
9.16.3.14 (Adaptive Security Appliance)
9.17.1 (Adaptive Security Appliance)
9.17.1.7 (Adaptive Security Appliance)
9.17.1.9 (Adaptive Security Appliance)
9.17.1.10 (Adaptive Security Appliance)
9.17.1.11 (Adaptive Security Appliance)
9.17.1.13 (Adaptive Security Appliance)
9.17.1.15 (Adaptive Security Appliance)
9.18.1 (Adaptive Security Appliance)
6.6.7 (Firepower Threat Defense)
9.16.1.28 (Adaptive Security Appliance)
9.16.2 (Adaptive Security Appliance)
9.16.2.3 (Adaptive Security Appliance)
9.16.2.7 (Adaptive Security Appliance)
9.16.2.11 (Adaptive Security Appliance)
9.16.2.13 (Adaptive Security Appliance)
9.16.2.14 (Adaptive Security Appliance)
9.16.3.15 (Adaptive Security Appliance)
9.16.3.19 (Adaptive Security Appliance)
9.16.3.23 (Adaptive Security Appliance)
9.16.4 (Adaptive Security Appliance)
9.16.4.9 (Adaptive Security Appliance)
9.17.1.20 (Adaptive Security Appliance)
9.18.1.3 (Adaptive Security Appliance)
9.18.2 (Adaptive Security Appliance)
9.18.2.5 (Adaptive Security Appliance)
9.18.2.7 (Adaptive Security Appliance)
9.19.1 (Adaptive Security Appliance)
7.0.5 (Firepower Threat Defense)
7.1.0.3 (Firepower Threat Defense)
7.2.1 (Firepower Threat Defense)
7.2.2 (Firepower Threat Defense)
7.2.3 (Firepower Threat Defense)
7.3.0 (Firepower Threat Defense)
7.3.1 (Firepower Threat Defense)
7.3.1.1 (Firepower Threat Defense)
9.8.4.20 (Adaptive Security Appliance)
9.8.4.26 (Adaptive Security Appliance)
9.8.4.29 (Adaptive Security Appliance)
9.12.1 (Adaptive Security Appliance)
9.12.1.2 (Adaptive Security Appliance)
9.12.1.3 (Adaptive Security Appliance)
9.12.2 (Adaptive Security Appliance)
9.12.2.1 (Adaptive Security Appliance)
9.12.2.4 (Adaptive Security Appliance)
9.12.2.5 (Adaptive Security Appliance)
9.12.2.9 (Adaptive Security Appliance)
9.12.3 (Adaptive Security Appliance)
9.12.3.2 (Adaptive Security Appliance)
9.12.3.7 (Adaptive Security Appliance)
9.12.3.9 (Adaptive Security Appliance)
9.12.4 (Adaptive Security Appliance)
9.12.4.4 (Adaptive Security Appliance)
9.12.4.7 (Adaptive Security Appliance)
9.12.4.8 (Adaptive Security Appliance)
9.12.4.10 (Adaptive Security Appliance)
9.12.4.13 (Adaptive Security Appliance)
9.12.4.18 (Adaptive Security Appliance)
9.12.4.24 (Adaptive Security Appliance)
9.12.4.26 (Adaptive Security Appliance)
9.12.4.29 (Adaptive Security Appliance)
9.12.4.30 (Adaptive Security Appliance)
9.12.4.35 (Adaptive Security Appliance)
9.14.1.6 (Adaptive Security Appliance)
9.8.4.32 (Adaptive Security Appliance)
9.8.4.33 (Adaptive Security Appliance)
9.8.4.34 (Adaptive Security Appliance)
9.8.4.35 (Adaptive Security Appliance)
9.8.4.39 (Adaptive Security Appliance)
9.8.4.40 (Adaptive Security Appliance)
9.8.4.41 (Adaptive Security Appliance)
9.8.4.43 (Adaptive Security Appliance)
9.8.4.44 (Adaptive Security Appliance)
9.8.4.45 (Adaptive Security Appliance)
9.8.4.46 (Adaptive Security Appliance)
9.8.4.48 (Adaptive Security Appliance)
9.12.3.12 (Adaptive Security Appliance)
9.12.4.37 (Adaptive Security Appliance)
9.12.4.38 (Adaptive Security Appliance)
9.12.4.39 (Adaptive Security Appliance)
9.12.4.40 (Adaptive Security Appliance)
9.12.4.41 (Adaptive Security Appliance)
9.12.4.47 (Adaptive Security Appliance)
9.12.4.48 (Adaptive Security Appliance)
9.12.4.50 (Adaptive Security Appliance)
9.12.4.52 (Adaptive Security Appliance)
9.12.4.54 (Adaptive Security Appliance)
9.12.4.55 (Adaptive Security Appliance)
9.12.4.56 (Adaptive Security Appliance)
9.14.4.13 (Adaptive Security Appliance)
9.14.4.14 (Adaptive Security Appliance)
9.14.4.15 (Adaptive Security Appliance)
9.14.4.17 (Adaptive Security Appliance)
9.14.4.22 (Adaptive Security Appliance)
9.14.4.23 (Adaptive Security Appliance)
9.16.4.14 (Adaptive Security Appliance)
9.16.4.18 (Adaptive Security Appliance)
9.17.1.30 (Adaptive Security Appliance)
9.18.2.8 (Adaptive Security Appliance)
9.18.3 (Adaptive Security Appliance)
9.19.1.5 (Adaptive Security Appliance)
9.19.1.9 (Adaptive Security Appliance)
6.2.3.3 (Firepower Threat Defense)
6.2.3.4 (Firepower Threat Defense)
6.2.3.5 (Firepower Threat Defense)
6.2.3.6 (Firepower Threat Defense)
6.2.3.7 (Firepower Threat Defense)
6.2.3.8 (Firepower Threat Defense)
6.2.3.9 (Firepower Threat Defense)
6.2.3.10 (Firepower Threat Defense)
6.2.3.11 (Firepower Threat Defense)
6.2.3.12 (Firepower Threat Defense)
6.2.3.13 (Firepower Threat Defense)
6.2.3.14 (Firepower Threat Defense)
6.2.3.15 (Firepower Threat Defense)
6.2.3.17 (Firepower Threat Defense)
6.2.3.18 (Firepower Threat Defense)
6.4.0.1 (Firepower Threat Defense)
6.4.0.2 (Firepower Threat Defense)
6.4.0.3 (Firepower Threat Defense)
6.4.0.4 (Firepower Threat Defense)
6.4.0.5 (Firepower Threat Defense)
6.4.0.6 (Firepower Threat Defense)
6.4.0.7 (Firepower Threat Defense)
6.4.0.8 (Firepower Threat Defense)
6.4.0.9 (Firepower Threat Defense)
6.4.0.10 (Firepower Threat Defense)
6.4.0.11 (Firepower Threat Defense)
6.4.0.12 (Firepower Threat Defense)
6.4.0.13 (Firepower Threat Defense)
6.4.0.14 (Firepower Threat Defense)
6.4.0.15 (Firepower Threat Defense)
6.4.0.16 (Firepower Threat Defense)
6.6.7.1 (Firepower Threat Defense)
6.7.0 (Firepower Threat Defense)
6.7.0.1 (Firepower Threat Defense)
6.7.0.2 (Firepower Threat Defense)
6.7.0.3 (Firepower Threat Defense)
7.1.0 (Firepower Threat Defense)

Тип ПО

ПО программно-аппаратного средства
ПО сетевого программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 5)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,8)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ac-acl-bypass-bwd7q6Gb

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 9%
0.00032
Низкий

5.8 Medium

CVSS3

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.8
nvd
больше 2 лет назад

Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. These vulnerabilities are due to a logic error that could occur when the affected software constructs and applies per-user-override rules. An attacker could exploit these vulnerabilities by connecting to a network through an affected device that has a vulnerable configuration. A successful exploit could allow the attacker to bypass the interface ACL and access resources that would should be protected.

CVSS3: 5.8
github
больше 2 лет назад

Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. These vulnerabilities are due to a logic error that could occur when the affected software constructs and applies per-user-override rules. An attacker could exploit these vulnerabilities by connecting to a network through an affected device that has a vulnerable configuration. A successful exploit could allow the attacker to bypass the interface ACL and access resources that would should be protected.

EPSS

Процентиль: 9%
0.00032
Низкий

5.8 Medium

CVSS3

5 Medium

CVSS2