QID 317106
Date Published: 2021-11-03
QID 317106: Cisco Firepower Threat Defense (FTD) Software Identity-Based Rule Bypass Vulnerability (cisco-sa-asaftd-rule-bypass-ejjOgQEY)
A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco FTD Software
could allow an unauthenticated, remote attacker to bypass security protections.
Affected Products
Cisco products if they were running a vulnerable release of FTD Software and had IDFW rules using object group search properties.
QID Detection Logic (Authenticated):
The check matches Cisco FTD Software version retrieved via Unix Auth using "version" command.
A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device,
bypass security protections, and send network traffic to unauthorized hosts.
Solution
Customers are advised to refer to cisco-sa-asaftd-rule-bypass-ejjOgQEY for more information.
Vendor References
- cisco-sa-asaftd-rule-bypass-ejjOgQEY -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-ejjOgQEY
CVEs related to QID 317106
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-asaftd-rule-bypass-ejjOgQEY |
|