Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-04603

Опубликовано: 22 мая 2024
Источник: fstec
CVSS3: 5.8
CVSS2: 5
EPSS Низкий

Описание

Уязвимость микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Cisco Firepower Threat Defense (FTD) связана с возникновением конфликта интерпретаций. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, обойти существующие ограничения безопасности

Вендор

Cisco Systems Inc.

Наименование ПО

Adaptive Security Appliance
Firepower Threat Defense

Версия ПО

9.19.1 (Adaptive Security Appliance)
7.3.0 (Firepower Threat Defense)
7.3.1 (Firepower Threat Defense)
7.3.1.1 (Firepower Threat Defense)
9.19.1.5 (Adaptive Security Appliance)
9.19.1.9 (Adaptive Security Appliance)
9.19.1.12 (Adaptive Security Appliance)
9.19.1.18 (Adaptive Security Appliance)
9.19.1.22 (Adaptive Security Appliance)
9.19.1.24 (Adaptive Security Appliance)
9.20.1 (Adaptive Security Appliance)
9.20.1.5 (Adaptive Security Appliance)
7.4.0 (Firepower Threat Defense)
7.3.1.2 (Firepower Threat Defense)

Тип ПО

ПО сетевого программно-аппаратного средства
ПО программно-аппаратного средства

Операционные системы и аппаратные платформы

Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -
Cisco Systems Inc. - -

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 5)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,8)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ogsnsg-aclbyp-3XB8q6jX

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 26%
0.00089
Низкий

5.8 Medium

CVSS3

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.8
nvd
больше 1 года назад

A vulnerability in the activation of an access control list (ACL) on Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the protection that is offered by a configured ACL on an affected device. This vulnerability is due to a logic error that occurs when an ACL changes from inactive to active in the running configuration of an affected device. An attacker could exploit this vulnerability by sending traffic through the affected device that should be denied by the configured ACL. The reverse condition is also true—traffic that should be permitted could be denied by the configured ACL. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device, allowing the attacker to access trusted networks that the device might be protecting. Note: This vulnerability applies to both IPv4 and IPv6 traffic as well as dual-stack ACL configurations in whi

CVSS3: 5.8
github
больше 1 года назад

A vulnerability in the activation of an access control list (ACL) on Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the protection that is offered by a configured ACL on an affected device. This vulnerability is due to a logic error that occurs when an ACL changes from inactive to active in the running configuration of an affected device. An attacker could exploit this vulnerability by sending traffic through the affected device that should be denied by the configured ACL. The reverse condition is also true—traffic that should be permitted could be denied by the configured ACL. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device, allowing the attacker to access trusted networks that the device might be protecting. Note: This vulnerability applies to both IPv4 and IPv6 traffic as well as dual-stack ACL configurations in ...

EPSS

Процентиль: 26%
0.00089
Низкий

5.8 Medium

CVSS3

5 Medium

CVSS2