Описание
Cisco Firewall Services Module (FWSM) 3.1(6), and 3.2(2) and earlier, does not properly enforce edited ACLs, which might allow remote attackers to bypass intended restrictions on network traffic, aka CSCsj52536.
Ссылки
- Third Party Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Permissions Required
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Permissions Required
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия от 3.1 (включая) до 3.1\(6\) (включая)Версия от 3.2 (включая) до 3.2\(2\) (включая)
Одно из
cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*
EPSS
Процентиль: 67%
0.0054
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
почти 4 года назад
Cisco Firewall Services Module (FWSM) 3.1(6), and 3.2(2) and earlier, does not properly enforce edited ACLs, which might allow remote attackers to bypass intended restrictions on network traffic, aka CSCsj52536.
EPSS
Процентиль: 67%
0.0054
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-264