First published: Wed Oct 23 2024(Updated: )
A vulnerability in the Network Service Group (NSG) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | ||
Cisco Firepower Threat Defense |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-asaftd-nsgacl-bypass-77XnEAsL is considered high due to the potential for unauthorized access to network resources.
To fix cisco-sa-asaftd-nsgacl-bypass-77XnEAsL, it is recommended to upgrade the affected Cisco ASA or Firepower Threat Defense software to the latest patched version.
Organizations using Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense Software are affected by cisco-sa-asaftd-nsgacl-bypass-77XnEAsL.
Exploiting cisco-sa-asaftd-nsgacl-bypass-77XnEAsL can allow an unauthenticated remote attacker to bypass access control lists, potentially leading to unauthorized traffic flow.
No specific workarounds for cisco-sa-asaftd-nsgacl-bypass-77XnEAsL have been published; the recommended action is to apply the appropriate software update.