QID 317105
Date Published: 2021-11-02
QID 317105: Cisco Adaptive Security Appliance Software (ASA) Identity-Based Rule Bypass Vulnerability (cisco-sa-asaftd-rule-bypass-ejjOgQEY)
A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco ASA Software
could allow an unauthenticated, remote attacker to bypass security protections.
Affected Products
Cisco products if they were running a vulnerable release of Cisco ASA Software or FTD Software and had IDFW rules using object group search properties.
Vulnerable Releases:
Prior to 9.8.4.40
From 9.9 Prior to 9.12.4.25
From 9.13 Prior to 9.14.3.1
From 9.15 Prior to 9.15.1.17
From 9.16 Prior to 9.16.1.28
Note: Potential detection as cannot confirm on whether IDFW rules using object group search properties is configured.
QID Detection Logic (Authenticated):
The check matches Cisco ASA OS version retrieved via Unix Auth using "version" command.
A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device,
bypass security protections, and send network traffic to unauthorized hosts.
Customers are advised to refer to cisco-sa-asaftd-rule-bypass-ejjOgQEY for more information.
- cisco-sa-asaftd-rule-bypass-ejjOgQEY -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-ejjOgQEY
CVEs related to QID 317105
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-asaftd-rule-bypass-ejjOgQEY |
|