QID 317105

Date Published: 2021-11-02

QID 317105: Cisco Adaptive Security Appliance Software (ASA) Identity-Based Rule Bypass Vulnerability (cisco-sa-asaftd-rule-bypass-ejjOgQEY)

A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco ASA Software
could allow an unauthenticated, remote attacker to bypass security protections.

Affected Products
Cisco products if they were running a vulnerable release of Cisco ASA Software or FTD Software and had IDFW rules using object group search properties.

Vulnerable Releases:
Prior to 9.8.4.40 From 9.9 Prior to 9.12.4.25 From 9.13 Prior to 9.14.3.1 From 9.15 Prior to 9.15.1.17 From 9.16 Prior to 9.16.1.28 Note: Potential detection as cannot confirm on whether IDFW rules using object group search properties is configured.

QID Detection Logic (Authenticated):
The check matches Cisco ASA OS version retrieved via Unix Auth using "version" command.

A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device,
bypass security protections, and send network traffic to unauthorized hosts.

  • CVSS V3 rated as Medium - 5.3 severity.
  • CVSS V2 rated as Medium - 4.3 severity.
  • Solution

    Customers are advised to refer to cisco-sa-asaftd-rule-bypass-ejjOgQEY for more information.

    CVEs related to QID 317105

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-asaftd-rule-bypass-ejjOgQEY URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-ejjOgQEY