QID 317008
Date Published: 2021-08-23
QID 317008: Cisco Firepower Threat Defense Software Virtual Private Network(VPN) Security Assertion Markup Language(SAML) Authentication Bypass Vulnerability(cisco-sa-20190501-asaftd-saml-vpn)
A vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 Single Sign-On (SSO) for Clientless SSL VPN (WebVPN)
and AnyConnect Remote Access VPN in Cisco Firepower Threat Defense (FTD)Software
could allow an unauthenticated, remote attacker to successfully establish a VPN session to an affected device.
Affected Products
Cisco FTD Software vulnerable release and configured for SAML 2.0-based SSO for Clientless SSL VPN (WebVPN) or AnyConnect Remote Access VPN for following:
Firepower 2100 Series
Firepower 4100 Series, Firepower 9300 Security Appliances(no support)
Firepower Threat Defense Virtual
Vulnerable releases
From 6.2.1 Prior to 6.2.3.12
From 6.3.0 Prior to 6.3.0.3
Note: Potential detection as cannot confirm SAML on Firepower.
A successful exploit could allow the attacker to connect to secured networks behind the affected device.
Customers are advised to refer to cisco-sa-20190501-asaftd-saml-vpn for more information.
- cisco-sa-20190501-asaftd-saml-vpn -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asaftd-saml-vpn
CVEs related to QID 317008
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-20190501-asaftd-saml-vpn |
|