QID 317405

Date Published: 2024-02-06

QID 317405: Cisco Adaptive Security Appliance (ASA) Software Remote Access Secure Sockets Layer (SSL) Virtual Private Network (VPN) Multiple Certificate Authentication Bypass Vulnerability (cisco-sa-asaftd-multi-cert-dzA3h5PT)

TA vulnerability in the remote access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to bypass a configured multiple certificate authentication policy and connect using only a valid username and password.

Affected Products
ASA Version from 9.8.1.0 prior to 9.12.4.62
ASA Version from 9.14.1.0 prior to 9.16.4.27
ASA Version from 9.17.1.0 prior to 9.17.1.33
ASA Version from 9.18.1.0 prior to 9.18.3.53
ASA Version from 9.19.1.0 prior to 9.19.1.18

QID Detection Logic (Authenticated):
The check matches Cisco ASA OS version retrieved via Unix Auth using "version" command.

A successful exploit could allow the attacker to bypass the configured multiple certificate authentication policy while retaining the privileges and permissions associated with the original connection profile.

  • CVSS V3 rated as Medium - 4.3 severity.
  • CVSS V2 rated as Medium - 4 severity.
  • Solution

    Customers are advised to refer to cisco-sa-asaftd-multi-cert-dzA3h5PT for more information.

    CVEs related to QID 317405

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-asaftd-multi-cert-dzA3h5PT URL Logo www.cisco.com/c/en/us/support/docs/csa/cisco-sa-asaftd-multi-cert-dzA3h5PT.html