Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-08867

Опубликовано: 23 окт. 2024
Источник: fstec
CVSS3: 5.8
CVSS2: 5
EPSS Низкий

Описание

Уязвимость функции группы сетевых служб (NSG) микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance и Cisco Firepower Threat Defense связана с обходом аутентификации посредством спуфинга. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, обойти существующие ограничения безопасности и пропустить нежелательный трафик

Вендор

Cisco Systems Inc.

Наименование ПО

Adaptive Security Appliance
Firepower Threat Defense

Версия ПО

9.16.1 (Adaptive Security Appliance)
7.0.0 (Firepower Threat Defense)
7.2.0 (Firepower Threat Defense)
7.2.0.1 (Firepower Threat Defense)
7.0.0.1 (Firepower Threat Defense)
7.0.1 (Firepower Threat Defense)
7.0.1.1 (Firepower Threat Defense)
7.0.2 (Firepower Threat Defense)
7.0.2.1 (Firepower Threat Defense)
7.0.3 (Firepower Threat Defense)
7.0.4 (Firepower Threat Defense)
7.1.0.1 (Firepower Threat Defense)
7.1.0.2 (Firepower Threat Defense)
9.16.3 (Adaptive Security Appliance)
9.16.3.3 (Adaptive Security Appliance)
9.16.3.14 (Adaptive Security Appliance)
9.17.1 (Adaptive Security Appliance)
9.17.1.7 (Adaptive Security Appliance)
9.17.1.9 (Adaptive Security Appliance)
9.17.1.10 (Adaptive Security Appliance)
9.17.1.11 (Adaptive Security Appliance)
9.17.1.13 (Adaptive Security Appliance)
9.17.1.15 (Adaptive Security Appliance)
9.18.1 (Adaptive Security Appliance)
9.16.1.28 (Adaptive Security Appliance)
9.16.2 (Adaptive Security Appliance)
9.16.2.3 (Adaptive Security Appliance)
9.16.2.7 (Adaptive Security Appliance)
9.16.2.11 (Adaptive Security Appliance)
9.16.2.13 (Adaptive Security Appliance)
9.16.2.14 (Adaptive Security Appliance)
9.16.3.15 (Adaptive Security Appliance)
9.16.3.19 (Adaptive Security Appliance)
9.16.3.23 (Adaptive Security Appliance)
9.16.4 (Adaptive Security Appliance)
9.16.4.9 (Adaptive Security Appliance)
9.17.1.20 (Adaptive Security Appliance)
9.18.1.3 (Adaptive Security Appliance)
9.18.2 (Adaptive Security Appliance)
9.18.2.5 (Adaptive Security Appliance)
9.18.2.7 (Adaptive Security Appliance)
9.19.1 (Adaptive Security Appliance)
7.0.5 (Firepower Threat Defense)
7.1.0.3 (Firepower Threat Defense)
7.2.1 (Firepower Threat Defense)
7.2.2 (Firepower Threat Defense)
7.2.3 (Firepower Threat Defense)
7.3.0 (Firepower Threat Defense)
7.3.1 (Firepower Threat Defense)
7.3.1.1 (Firepower Threat Defense)
7.2.4 (Firepower Threat Defense)
9.16.4.14 (Adaptive Security Appliance)
9.16.4.18 (Adaptive Security Appliance)
9.17.1.30 (Adaptive Security Appliance)
9.18.2.8 (Adaptive Security Appliance)
9.18.3 (Adaptive Security Appliance)
9.19.1.5 (Adaptive Security Appliance)
9.19.1.9 (Adaptive Security Appliance)
7.1.0 (Firepower Threat Defense)
9.16.4.19 (Adaptive Security Appliance)
9.16.4.27 (Adaptive Security Appliance)
9.18.3.39 (Adaptive Security Appliance)
9.18.3.46 (Adaptive Security Appliance)
9.19.1.12 (Adaptive Security Appliance)
7.0.6 (Firepower Threat Defense)
9.16.4.38 (Adaptive Security Appliance)
9.18.3.53 (Adaptive Security Appliance)
9.18.3.55 (Adaptive Security Appliance)
9.19.1.18 (Adaptive Security Appliance)
7.2.4.1 (Firepower Threat Defense)
7.2.5 (Firepower Threat Defense)
9.16.4.39 (Adaptive Security Appliance)
9.16.4.42 (Adaptive Security Appliance)
9.16.4.48 (Adaptive Security Appliance)
9.16.4.55 (Adaptive Security Appliance)
9.17.1.33 (Adaptive Security Appliance)
9.18.3.56 (Adaptive Security Appliance)
9.18.4 (Adaptive Security Appliance)
9.18.4.5 (Adaptive Security Appliance)
9.18.4.8 (Adaptive Security Appliance)
9.19.1.22 (Adaptive Security Appliance)
9.19.1.24 (Adaptive Security Appliance)
9.19.1.27 (Adaptive Security Appliance)
9.20.1 (Adaptive Security Appliance)
9.20.1.5 (Adaptive Security Appliance)
9.20.2 (Adaptive Security Appliance)
7.0.6.1 (Firepower Threat Defense)
7.2.5.1 (Firepower Threat Defense)
7.4.0 (Firepower Threat Defense)
7.4.1 (Firepower Threat Defense)
7.3.1.2 (Firepower Threat Defense)
9.16.4.57 (Adaptive Security Appliance)
9.16.4.61 (Adaptive Security Appliance)
9.17.1.39 (Adaptive Security Appliance)
9.18.4.22 (Adaptive Security Appliance)
9.18.4.24 (Adaptive Security Appliance)
9.18.4.29 (Adaptive Security Appliance)
9.19.1.28 (Adaptive Security Appliance)
9.19.1.31 (Adaptive Security Appliance)
9.20.2.10 (Adaptive Security Appliance)
9.20.2.21 (Adaptive Security Appliance)
9.20.2.22 (Adaptive Security Appliance)
7.0.6.2 (Firepower Threat Defense)
7.2.5.2 (Firepower Threat Defense)
7.2.8.1 (Firepower Threat Defense)
7.4.1.1 (Firepower Threat Defense)
7.2.6 (Firepower Threat Defense)
7.2.7 (Firepower Threat Defense)
7.2.8 (Firepower Threat Defense)
7.4.2 (Firepower Threat Defense)

Тип ПО

ПО сетевого программно-аппаратного средства
ПО программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 5)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,8)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nsgacl-bypass-77XnEAsL

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 32%
0.00127
Низкий

5.8 Medium

CVSS3

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.8
nvd
больше 1 года назад

A vulnerability in the Network Service Group (NSG) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. This vulnerability is due to a logic error that occurs when NSG ACLs are populated on an affected device. An attacker could exploit this vulnerability by establishing a connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules.

CVSS3: 5.8
github
больше 1 года назад

A vulnerability in the Network Service Group (NSG) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. This vulnerability is due to a logic error that occurs when NSG ACLs are populated on an affected device. An attacker could exploit this vulnerability by establishing a connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules.

EPSS

Процентиль: 32%
0.00127
Низкий

5.8 Medium

CVSS3

5 Medium

CVSS2