QID 317270
Date Published: 2022-11-23
QID 317270: Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software Virtual Private Network (VPN) Authorization Bypass Vulnerability (cisco-sa-asa-ftd-vp-authz-N2GckjN6)
A vulnerability in the authentication and authorization flows for VPN connections in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to establish a connection as a different user.
Note: We are not checking "VPN with multi-factor authentication (MFA) enabled" status in this QID hence kept Vuln Category as Practice.
Affected Products
At the time of publication, this vulnerability affected Cisco products if they were running a vulnerable release of Cisco ASA Software or Cisco FTD Software and had VPN with multi-factor authentication (MFA) enabled.
From 9.6.1 Prior to 9.8.4.46
From 9.9.1 Prior to 9.12.4.40
From 9.13.1 Prior to 9.14.4.7
From 9.15.1 Prior to 9.16.3
From 9.17.1 Prior to 9.17.1.9
QID Detection Logic (Authenticated):
The check matches Cisco ASA OS version retrieved via Unix Auth using "version" command.
A successful exploit could allow the attacker to establish a VPN connection with access privileges from a different user.
Customers are advised to refer to cisco-sa-asa-ftd-vp-authz-N2GckjN6 for more information.
- cisco-sa-asa-ftd-vp-authz-N2GckjN6 -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-vp-authz-N2GckjN6
CVEs related to QID 317270
Advisory ID | Software | Component | Link |
---|---|---|---|
cisco-sa-asa-ftd-vp-authz-N2GckjN6 |
![]() |