CVE-2021-34790
Published on: 10/27/2021 12:00:00 AM UTC
Last Modified on: 10/27/2022 04:43:00 PM UTC
CVE-2021-34790 - advisory for cisco-sa-natalg-bypass-cpKGqkng
Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Adaptive Security Appliance from Cisco contain the following vulnerability:
Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming.
- CVE-2021-34790 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities described in this advisory.
- Affected Vendor/Software:
Cisco - Cisco Adaptive Security Appliance (ASA) Software version n/a
CVSS3 Score: 5.3 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | LOW | NONE |
CVSS2 Score: 5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Application Level Gateway Bypass Vulnerabilities | tools.cisco.com text/html |
![]() |
Related QID Numbers
Exploit/POC from Github
This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file i…
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Cisco | Adaptive Security Appliance | All | All | All | All |
Hardware
| Cisco | Asa 5505 | - | All | All | All |
Operating System | Cisco | Asa 5505 Firmware | 009.008 | All | All | All |
Operating System | Cisco | Asa 5505 Firmware | 009.015 | All | All | All |
Hardware
| Cisco | Asa 5512-x | - | All | All | All |
Operating System | Cisco | Asa 5512-x Firmware | 009.008 | All | All | All |
Operating System | Cisco | Asa 5512-x Firmware | 009.015 | All | All | All |
Hardware
| Cisco | Asa 5515-x | - | All | All | All |
Operating System | Cisco | Asa 5515-x Firmware | 009.008 | All | All | All |
Operating System | Cisco | Asa 5515-x Firmware | 009.015 | All | All | All |
Hardware
| Cisco | Asa 5525-x | - | All | All | All |
Operating System | Cisco | Asa 5525-x Firmware | 009.008 | All | All | All |
Operating System | Cisco | Asa 5525-x Firmware | 009.015 | All | All | All |
Hardware
| Cisco | Asa 5545-x | - | All | All | All |
Operating System | Cisco | Asa 5545-x Firmware | 009.008 | All | All | All |
Operating System | Cisco | Asa 5545-x Firmware | 009.015 | All | All | All |
Hardware
| Cisco | Asa 5555-x | - | All | All | All |
Operating System | Cisco | Asa 5555-x Firmware | 009.008 | All | All | All |
Operating System | Cisco | Asa 5555-x Firmware | 009.015 | All | All | All |
Hardware
| Cisco | Asa 5580 | - | All | All | All |
Operating System | Cisco | Asa 5580 Firmware | 009.008 | All | All | All |
Operating System | Cisco | Asa 5580 Firmware | 009.015 | All | All | All |
Hardware
| Cisco | Asa 5585-x | - | All | All | All |
Operating System | Cisco | Asa 5585-x Firmware | 009.008 | All | All | All |
Operating System | Cisco | Asa 5585-x Firmware | 009.015 | All | All | All |
Application | Cisco | Firepower Threat Defense | All | All | All | All |
- cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5505_firmware:009.008:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5505_firmware:009.015:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5512-x_firmware:009.008:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5512-x_firmware:009.015:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5515-x_firmware:009.008:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5515-x_firmware:009.015:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5525-x_firmware:009.008:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5525-x_firmware:009.015:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5545-x_firmware:009.008:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5545-x_firmware:009.015:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5555-x_firmware:009.008:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5555-x_firmware:009.015:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5580_firmware:009.008:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5580_firmware:009.015:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5585-x_firmware:009.008:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:asa_5585-x_firmware:009.015:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2021-34790 : Multiple vulnerabilities in the Application Level Gateway ALG for the Network Address Translatio… twitter.com/i/web/status/1… | 2021-10-27 19:09:42 |
![]() |
Cisco ASA Software に SIP ALG を迂回されるなど複数の問題 (CVE-2021-34790, CVE-2021-34791) [40358] sid.softek.jp/content/show/4… #SIDfm #脆弱性情報 | 2021-10-28 07:30:49 |
![]() |
RT: CVE-2021-34790 Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Transla… twitter.com/i/web/status/1… | 2021-10-28 07:33:52 |