CVE-2017-3867
Published on: 03/17/2017 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:26:31 PM UTC
Certain versions of Adaptive Security Appliance from Cisco contain the following vulnerability:
A vulnerability in the Border Gateway Protocol (BGP) Bidirectional Forwarding Detection (BFD) implementation of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to bypass the access control list (ACL) for specific TCP and UDP traffic. More Information: CSCvc68229. Known Affected Releases: 9.6(2). Known Fixed Releases: 99.1(20.1) 99.1(10.2) 98.1(12.7) 98.1(1.49) 97.1(6.58) 97.1(0.134) 96.2(0.109) 9.7(1.1) 9.6(2.99) 9.6(2.8).
- CVE-2017-3867 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 5.3 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | LOW | NONE |
CVSS2 Score: 5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Cisco ASA BGP Bidirectional Forwarding Detection Bug Lets Remote Users Bypass the Firewall - SecurityTracker | www.securitytracker.com text/html |
![]() |
Cisco Adaptive Security Appliance BGP Bidirectional Forwarding Detection ACL Bypass Vulnerability | Mitigation Vendor Advisory tools.cisco.com text/html |
![]() |
Cisco Adaptive Security Appliance Software CVE-2017-3867 Security Bypass Vulnerability | Third Party Advisory VDB Entry cve.report (archive) text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
- cpe:2.3:h:cisco:adaptive_security_appliance:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:adaptive_security_appliance:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:6.3.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.3:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.7:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.8:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.9:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.3:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:6.3.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.3:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.7:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.8:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.9:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.3:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE