CVE-2021-34787
Published on: 10/27/2021 12:00:00 AM UTC
Last Modified on: 10/29/2021 12:31:00 PM UTC
CVE-2021-34787 - advisory for cisco-sa-asaftd-rule-bypass-ejjOgQEY
Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Adaptive Security Appliance from Cisco contain the following vulnerability:
A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass security protections. This vulnerability is due to improper handling of network requests by affected devices configured to use object group search. An attacker could exploit this vulnerability by sending a specially crafted network request to an affected device. A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device, bypass security protections, and send network traffic to unauthorized hosts.
- CVE-2021-34787 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
- Affected Vendor/Software:
Cisco - Cisco Adaptive Security Appliance (ASA) Software version n/a
CVSS3 Score: 5.3 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | LOW | NONE |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Identity-Based Rule Bypass Vulnerability | tools.cisco.com text/html |
![]() |
Related QID Numbers
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Cisco | Adaptive Security Appliance | All | All | All | All |
Hardware
| Cisco | Asa 5505 | - | All | All | All |
Operating System | Cisco | Asa 5505 Firmware | 009.009 | All | All | All |
Operating System | Cisco | Asa 5505 Firmware | 009.012 | All | All | All |
Hardware
| Cisco | Asa 5512-x | - | All | All | All |
Operating System | Cisco | Asa 5512-x Firmware | 009.009 | All | All | All |
Operating System | Cisco | Asa 5512-x Firmware | 009.012 | All | All | All |
Hardware
| Cisco | Asa 5515-x | - | All | All | All |
Operating System | Cisco | Asa 5515-x Firmware | 009.009 | All | All | All |
Operating System | Cisco | Asa 5515-x Firmware | 009.012 | All | All | All |
Hardware
| Cisco | Asa 5525-x | - | All | All | All |
Operating System | Cisco | Asa 5525-x Firmware | 009.009 | All | All | All |
Operating System | Cisco | Asa 5525-x Firmware | 009.012 | All | All | All |
Hardware
| Cisco | Asa 5545-x | - | All | All | All |
Operating System | Cisco | Asa 5545-x Firmware | 009.009 | All | All | All |
Operating System | Cisco | Asa 5545-x Firmware | 009.012 | All | All | All |
Hardware
| Cisco | Asa 5555-x | - | All | All | All |
Operating System | Cisco | Asa 5555-x Firmware | 009.009 | All | All | All |
Operating System | Cisco | Asa 5555-x Firmware | 009.012 | All | All | All |
Hardware
| Cisco | Asa 5580 | - | All | All | All |
Operating System | Cisco | Asa 5580 Firmware | 009.009 | All | All | All |
Operating System | Cisco | Asa 5580 Firmware | 009.012 | All | All | All |
Hardware
| Cisco | Asa 5585-x | - | All | All | All |
Operating System | Cisco | Asa 5585-x Firmware | 009.009 | All | All | All |
Operating System | Cisco | Asa 5585-x Firmware | 009.012 | All | All | All |
Application | Cisco | Firepower Threat Defense | All | All | All | All |
- cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5505_firmware:009.009:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5505_firmware:009.012:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5512-x_firmware:009.009:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5512-x_firmware:009.012:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5515-x_firmware:009.009:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5515-x_firmware:009.012:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5525-x_firmware:009.009:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5525-x_firmware:009.012:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5545-x_firmware:009.009:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5545-x_firmware:009.012:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5555-x_firmware:009.009:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5555-x_firmware:009.012:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5580_firmware:009.009:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5580_firmware:009.012:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5585-x_firmware:009.009:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5585-x_firmware:009.012:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2021-34787 : A vulnerability in the identity-based firewall IDFW rule processing feature of Cisco Adaptive… twitter.com/i/web/status/1… | 2021-10-27 19:09:26 |
![]() |
RT: CVE-2021-34787 A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco Adaptive… twitter.com/i/web/status/1… | 2021-10-28 07:33:50 |
![]() |
A new #attackerkb assesment on 'CVE-2021-34787' has been created by ccondon-r7. Attacker Value: 4 | Exploitability:… twitter.com/i/web/status/1… | 2021-10-29 17:40:59 |
![]() |
Cisco ASA/FTD security bypass CVE-2021-34787 rated "Medium" severity. Admittedly not RCE, but "Medium" seems like l… twitter.com/i/web/status/1… | 2021-10-29 17:44:22 |