QID 317405
Date Published: 2024-02-06
QID 317405: Cisco Adaptive Security Appliance (ASA) Software Remote Access Secure Sockets Layer (SSL) Virtual Private Network (VPN) Multiple Certificate Authentication Bypass Vulnerability (cisco-sa-asaftd-multi-cert-dzA3h5PT)
TA vulnerability in the remote access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to bypass a configured multiple certificate authentication policy and connect using only a valid username and password.
Affected Products
ASA Version from 9.8.1.0 prior to 9.12.4.62
ASA Version from 9.14.1.0 prior to 9.16.4.27
ASA Version from 9.17.1.0 prior to 9.17.1.33
ASA Version from 9.18.1.0 prior to 9.18.3.53
ASA Version from 9.19.1.0 prior to 9.19.1.18
QID Detection Logic (Authenticated):
The check matches Cisco ASA OS version retrieved via Unix Auth using "version" command.
A successful exploit could allow the attacker to bypass the configured multiple certificate authentication policy while retaining the privileges and permissions associated with the original connection profile.
Customers are advised to refer to cisco-sa-asaftd-multi-cert-dzA3h5PT for more information.
- cisco-sa-asaftd-multi-cert-dzA3h5PT -
sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-multi-cert-dzA3h5PT
CVEs related to QID 317405
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-asaftd-multi-cert-dzA3h5PT |
|