QID 317008

Date Published: 2021-08-23

QID 317008: Cisco Firepower Threat Defense Software Virtual Private Network(VPN) Security Assertion Markup Language(SAML) Authentication Bypass Vulnerability(cisco-sa-20190501-asaftd-saml-vpn)

A vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 Single Sign-On (SSO) for Clientless SSL VPN (WebVPN)
and AnyConnect Remote Access VPN in Cisco Firepower Threat Defense (FTD)Software
could allow an unauthenticated, remote attacker to successfully establish a VPN session to an affected device.

Affected Products
Cisco FTD Software vulnerable release and configured for SAML 2.0-based SSO for Clientless SSL VPN (WebVPN) or AnyConnect Remote Access VPN for following: Firepower 2100 Series
Firepower 4100 Series, Firepower 9300 Security Appliances(no support)
Firepower Threat Defense Virtual

Vulnerable releases
From 6.2.1 Prior to 6.2.3.12
From 6.3.0 Prior to 6.3.0.3
Note: Potential detection as cannot confirm SAML on Firepower.

A successful exploit could allow the attacker to connect to secured networks behind the affected device.

  • CVSS V3 rated as Critical - 8.6 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution

    Customers are advised to refer to cisco-sa-20190501-asaftd-saml-vpn for more information.

    CVEs related to QID 317008

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-20190501-asaftd-saml-vpn URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asaftd-saml-vpn