QID 317106

Date Published: 2021-11-03

QID 317106: Cisco Firepower Threat Defense (FTD) Software Identity-Based Rule Bypass Vulnerability (cisco-sa-asaftd-rule-bypass-ejjOgQEY)

A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco FTD Software
could allow an unauthenticated, remote attacker to bypass security protections.

Affected Products
Cisco products if they were running a vulnerable release of FTD Software and had IDFW rules using object group search properties.

QID Detection Logic (Authenticated):
The check matches Cisco FTD Software version retrieved via Unix Auth using "version" command.

A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device,
bypass security protections, and send network traffic to unauthorized hosts.

  • CVSS V3 rated as Medium - 5.3 severity.
  • CVSS V2 rated as Medium - 4.3 severity.
  • Solution

    Customers are advised to refer to cisco-sa-asaftd-rule-bypass-ejjOgQEY for more information.

    CVEs related to QID 317106

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-asaftd-rule-bypass-ejjOgQEY URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-ejjOgQEY