Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-34754

Опубликовано: 27 окт. 2021
Источник: nvd
CVSS3: 5.8
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

Multiple vulnerabilities in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic. These vulnerabilities are due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit these vulnerabilities by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should be activated for the ENIP packet.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
Версия от 6.4.0 (включая) до 6.4.0.13 (исключая)
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
Версия от 6.6.0 (включая) до 6.6.5.1 (исключая)
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
Версия от 6.7.0 (включая) до 6.7.0.3 (исключая)
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
Версия от 7.0.0 (включая) до 7.0.1 (исключая)
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.12:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:2.9.18:*:*:*:*:*:*:*

EPSS

Процентиль: 31%
0.00119
Низкий

5.8 Medium

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-284
NVD-CWE-Other

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

Multiple vulnerabilities in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic. These vulnerabilities are due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit these vulnerabilities by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should be activated for the ENIP packet.

CVSS3: 5.8
fstec
больше 4 лет назад

Уязвимость реализации протокола Ethernet Industrial Protocol (ENIP) микропрограммного обеспечения межсетевых экранов Cisco Firepower Threat Defense (FTD), позволяющая нарушителю обойти ограничения безопасности

EPSS

Процентиль: 31%
0.00119
Низкий

5.8 Medium

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-284
NVD-CWE-Other