Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-10988

Опубликовано: 10 окт. 2024
Источник: fstec
CVSS3: 5.3
CVSS2: 5
EPSS Низкий

Описание

Уязвимость микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Cisco Firepower Threat Defense (FTD) связана с недостатками контроля доступа. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, получить конфиденциальную информацию путем прослушивания сетевого трафика

Вендор

Cisco Systems Inc.

Наименование ПО

Adaptive Security Appliance
Firepower Threat Defense

Версия ПО

9.18.2 (Adaptive Security Appliance)
9.18.2.5 (Adaptive Security Appliance)
9.18.2.7 (Adaptive Security Appliance)
9.19.1 (Adaptive Security Appliance)
7.3.0 (Firepower Threat Defense)
7.3.1 (Firepower Threat Defense)
7.3.1.1 (Firepower Threat Defense)
9.18.2.8 (Adaptive Security Appliance)
9.18.3 (Adaptive Security Appliance)
9.19.1.5 (Adaptive Security Appliance)
9.19.1.9 (Adaptive Security Appliance)
9.18.3.39 (Adaptive Security Appliance)
9.18.3.46 (Adaptive Security Appliance)
9.19.1.12 (Adaptive Security Appliance)
9.18.3.53 (Adaptive Security Appliance)
9.18.3.55 (Adaptive Security Appliance)
9.19.1.18 (Adaptive Security Appliance)
9.18.3.56 (Adaptive Security Appliance)
9.18.4 (Adaptive Security Appliance)
9.18.4.5 (Adaptive Security Appliance)
9.18.4.8 (Adaptive Security Appliance)
9.19.1.22 (Adaptive Security Appliance)
9.19.1.24 (Adaptive Security Appliance)
9.19.1.27 (Adaptive Security Appliance)
9.20.1 (Adaptive Security Appliance)
9.20.1.5 (Adaptive Security Appliance)
9.20.2 (Adaptive Security Appliance)
7.4.0 (Firepower Threat Defense)
7.4.1 (Firepower Threat Defense)
7.3.1.2 (Firepower Threat Defense)
9.18.4.22 (Adaptive Security Appliance)
9.18.4.24 (Adaptive Security Appliance)
9.18.4.29 (Adaptive Security Appliance)
9.19.1.28 (Adaptive Security Appliance)
9.19.1.31 (Adaptive Security Appliance)
9.20.2.10 (Adaptive Security Appliance)
9.20.2.21 (Adaptive Security Appliance)
9.20.2.22 (Adaptive Security Appliance)
7.4.1.1 (Firepower Threat Defense)
9.18.4.40 (Adaptive Security Appliance)
9.20.3 (Adaptive Security Appliance)
9.18.4.34 (Adaptive Security Appliance)
7.4.2 (Firepower Threat Defense)
9.20.3.4 (Adaptive Security Appliance)
9.20.3.7 (Adaptive Security Appliance)
9.22.1.1 (Adaptive Security Appliance)
7.4.2.1 (Firepower Threat Defense)
7.6.0 (Firepower Threat Defense)
9.18.4.47 (Adaptive Security Appliance)
9.18.4.50 (Adaptive Security Appliance)
9.19.1.37 (Adaptive Security Appliance)
9.19.1.38 (Adaptive Security Appliance)
9.20.3.9 (Adaptive Security Appliance)
9.22.1.2 (Adaptive Security Appliance)

Тип ПО

ПО сетевого программно-аппаратного средства
ПО программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 5)
Средний уровень опасности (базовая оценка CVSS 3.1 составляет 5,3)

Возможные меры по устранению уязвимости

Использовать рекомендации:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-acl-bypass-mtPze9Yh

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Ссылки на источники

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 8%
0.00029
Низкий

5.3 Medium

CVSS3

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.3
nvd
6 месяцев назад

A vulnerability in the implementation of access control rules for loopback interfaces in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to send traffic that should have been blocked to a loopback interface. This vulnerability is due to improper enforcement of access control rules for loopback interfaces. An attacker could exploit this vulnerability by sending traffic to a loopback interface on an affected device. A successful exploit could allow the attacker to bypass configured access control rules and send traffic that should have been blocked to a loopback interface on the device.

CVSS3: 5.3
github
6 месяцев назад

A vulnerability in the implementation of access control rules for loopback interfaces in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to send traffic that should have been blocked to a loopback interface. This vulnerability is due to improper enforcement of access control rules for loopback interfaces. An attacker could exploit this vulnerability by sending traffic to a loopback interface on an affected device. A successful exploit could allow the attacker to bypass configured access control rules and send traffic that should have been blocked to a loopback interface on the device.

EPSS

Процентиль: 8%
0.00029
Низкий

5.3 Medium

CVSS3

5 Medium

CVSS2